Miggo Logo

CVE-2014-2829: Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream

N/A

CVSS Score

Basic Information

EPSS Score
0.64907%
CWE
-
Published
5/17/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyErlang

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
MongooseIMerlang<= 1.3.11.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of compressed XML streams in the zlib driver. The key evidence is in the commit diff showing the addition of a size_limit check during inflation. The original code in ejabberd_zlib_drv.c's control function processed compressed data in a loop without size restrictions, making it vulnerable to 'billion laughs'-style compression attacks. The patch added critical size validation (die_unless(rlen < size_limit)) to prevent unbounded memory allocation during decompression.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*rl*n* Solutions Mon*oos*IM t*rou** *.*.* r*v. * *o*s not prop*rly r*stri*t t** pro**ssin* o* *ompr*ss** XML *l*m*nts, w*i** *llows r*mot* *tt**k*rs to **us* * **ni*l o* s*rvi** (r*sour** *onsumption) vi* * *r**t** XMPP str**m, *k* *n "xmpp*om*" *tt*

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* *ompr*ss** XML str**ms in t** zli* *riv*r. T** k*y *vi**n** is in t** *ommit *i** s*owin* t** ***ition o* * siz*_limit ****k *urin* in*l*tion. T** ori*in*l *o** in *j****r*_zli*_*rv.*'s *ontrol *un*ti