Multiple vulnerabilities have been found in Gentoo's JabberD 2.x ebuild, the worst of which allows local attackers to escalate privileges.
|Package||net-im/jabberd2 on all architectures|
|Affected versions||<= 2.6.1|
JabberD 2.x is an open source Jabber server written in C.
Multiple vulnerabilities have been discovered in Gentoo’s JabberD 2.x ebuild. Please review the referenced CVE identifiers for details.
An attacker could possibly escalate privileges by owning system binaries in trusted locations, cause a Denial of Service condition by manipulating the PID file from jabberd2 services, bypass security via SASL ANONYMOUS connections or have other unspecified impacts.
There is no known workaround at this time.
Gentoo has discontinued support for JabberD 2.x and recommends that users unmerge the package:
# emerge --unmerge "net-im/jabberd2"
As an alternative, users may want to upgrade their systems to use net-im/prosody instead of net-im/jabberd2.