s2s/out.c in jabberd2 2.2.16 and earlier does not verify that a request was made for an XMPP Server Dialback response, which allows remote XMPP servers to spoof domains via a (1) Verify Response or (2) Authorization Response.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2012-1538.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/08/22/5 | mailing list |
http://www.openwall.com/lists/oss-security/2012/08/22/6 | mailing list |
http://www.securityfocus.com/bid/55167 | vdb entry |
http://secunia.com/advisories/50124 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=850872 | |
http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html | vendor advisory |
http://xmpp.org/resources/security-notices/server-dialback/ | vendor advisory |
https://github.com/Jabberd2/jabberd2/commit/aabcffae560d5fd00cd1d2ffce5d760353cf0a4d | patch exploit |
http://rhn.redhat.com/errata/RHSA-2012-1539.html | vendor advisory |
http://www.mail-archive.com/jabberd2%40lists.xiaoka.com/msg01903.html | mailing list |
http://secunia.com/advisories/50859 | third party advisory |