1 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

Erlang Solutions MongooseIM through 1.3.1 rev. 2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack. Erlang Solutions MongooseIM hasta 1.3.1 rev. 2 no restringe debidamente el procesamiento de elementos XML comprimidos, lo que permite a atacantes remotos causar una denegación de servicio (consumo de recursos) a través de una cadena XMPP manipulada, también conocido como un ataque "xmppbomb". • http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas https://github.com/esl/MongooseIM/commit/586d96cc12ef218243a3466354b4d208b5472a6c • CWE-264: Permissions, Privileges, and Access Controls •