Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200804-26 ] Openfire: Denial of Service
Date: Wed, 23 Apr 2008 17:14:50
Message-Id: 200804231835.53103.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200804-26
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Openfire: Denial of Service
9 Date: April 23, 2008
10 Bugs: #217234
11 ID: 200804-26
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A design error in Openfire might lead to a Denial of Service.
19
20 Background
21 ==========
22
23 Openfire (formerly Wildfire) is a Java implementation of a complete
24 Jabber server.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-im/openfire < 3.5.0 >= 3.5.0
33
34 Description
35 ===========
36
37 Openfire's connection manager in the file ConnectionManagerImpl.java
38 cannot handle clients that fail to read messages, and has no limit on
39 their session's send buffer.
40
41 Impact
42 ======
43
44 Remote authenticated attackers could trigger large outgoing queues
45 without reading messages, causing a Denial of Service.
46
47 Workaround
48 ==========
49
50 There is no known workaround at this time.
51
52 Resolution
53 ==========
54
55 All Openfire users should upgrade to the latest version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=net-im/openfire-3.5.0"
59
60 References
61 ==========
62
63 [ 1 ] CVE-2008-1728
64 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1728
65
66 Availability
67 ============
68
69 This GLSA and any updates to it are available for viewing at
70 the Gentoo Security Website:
71
72 http://security.gentoo.org/glsa/glsa-200804-26.xml
73
74 Concerns?
75 =========
76
77 Security is a primary focus of Gentoo Linux and ensuring the
78 confidentiality and security of our users machines is of utmost
79 importance to us. Any security concerns should be addressed to
80 security@g.o or alternatively, you may file a bug at
81 http://bugs.gentoo.org.
82
83 License
84 =======
85
86 Copyright 2008 Gentoo Foundation, Inc; referenced text
87 belongs to its owner(s).
88
89 The contents of this document are licensed under the
90 Creative Commons - Attribution / Share Alike license.
91
92 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature