The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-407-1 prosody security update
Debian DSA Debian DSA DSA-3463-1 prosody security update
EUVD EUVD EUVD-2016-0776 The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T22:30:04.031Z

Reserved: 2015-12-16T00:00:00

Link: CVE-2016-0756

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-01-29T20:59:06.560

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-0756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.