Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

CHAT:JABBER:UNAME-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

CHAT

Keywords

Jabber 2.x Username Buffer Overflow

Release Date

2004/12/17

Update Number

1213

Supported Platforms

idp-4.1+, isg-3.5+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

CHAT: Jabber 2.x Username Buffer Overflow


This signature detects attempts to overflow the username field in cleartext XMPP communications. Jabberd 2.x incorrectly verifies the username field length, enabling a malicious user to overflow a buffer. When Jabberd is running as root, an attacker can also execute arbitrary code.

Extended Description

Multiple remote buffer overflow vulnerabilities affect the Jabber Server. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into finite process buffers. An attacker may leverage these issues to execute arbitrary code on a computer with the privileges of the server process. This may facilitate unauthorized access or privilege escalation.

Affected Products

  • Jabber Software Foundation Jabber Server 2.0.0

References

  • BugTraq: 11741
  • CVE: CVE-2004-0953
  • URL: http://www.derkeiler.com/Mailing-Lists/Full-Disclosure/2004-11/1193.html
  • URL: http://www.jabber.org

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out