GHSA-5v5w-44w6-q5hv

Suggest an improvement
Source
https://github.com/advisories/GHSA-5v5w-44w6-q5hv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5v5w-44w6-q5hv/GHSA-5v5w-44w6-q5hv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5v5w-44w6-q5hv
Aliases
  • CVE-2014-2829
Published
2022-05-17T04:47:27Z
Modified
2023-11-08T03:57:36.776476Z
Summary
Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream
Details

Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.

References

Affected packages

Hex / MongooseIM

Package

Name
MongooseIM
Purl
pkg:hex/MongooseIM

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2

Database specific

{
    "last_known_affected_version_range": "<= 1.3.1"
}