JabberD 2.x: Multiple vulnerabilities — GLSA 201803-07

Multiple vulnerabilities have been found in Gentoo's JabberD 2.x ebuild, the worst of which allows local attackers to escalate privileges.

Affected packages

net-im/jabberd2 on all architectures
Affected versions <= 2.6.1
Unaffected versions

Background

JabberD 2.x is an open source Jabber server written in C.

Description

Multiple vulnerabilities have been discovered in Gentoo’s JabberD 2.x ebuild. Please review the referenced CVE identifiers for details.

Impact

An attacker could possibly escalate privileges by owning system binaries in trusted locations, cause a Denial of Service condition by manipulating the PID file from jabberd2 services, bypass security via SASL ANONYMOUS connections or have other unspecified impacts.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for JabberD 2.x and recommends that users unmerge the package:

 # emerge --unmerge "net-im/jabberd2"
 

As an alternative, users may want to upgrade their systems to use net-im/prosody instead of net-im/jabberd2.

References

Release date
March 19, 2018

Latest revision
March 19, 2018: 1

Severity
high

Exploitable
local, remote

Bugzilla entries