GHSA-5v5w-44w6-q5hv

Suggest an improvement
Source
https://github.com/advisories/GHSA-5v5w-44w6-q5hv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-5v5w-44w6-q5hv/GHSA-5v5w-44w6-q5hv.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5v5w-44w6-q5hv
Aliases
  • CVE-2014-2829
Published
2022-05-17T04:47:27Z
Modified
2023-11-08T03:57:36.776476Z
Summary
Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream
Details

Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.

Database specific
{
    "nvd_published_at": "2014-04-11T01:55:00Z",
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-01T13:43:01Z"
}
References

Affected packages

Hex / MongooseIM

Package

Name
MongooseIM
Purl
pkg:hex/MongooseIM

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2

Database specific

{
    "last_known_affected_version_range": "<= 1.3.1"
}