CVE-2016-1232Improper Control of Interaction Frequency in Prosody

5 documents5 sources
Severity
7.5HIGHNVD
EPSS
0.7%
top 27.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 12
Latest updateMay 17

Description

The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/prosody< prosody 0.9.9-1 (bookworm)
Debianprosody/prosody< 0.9.9-1+3
NVDprosody/prosody0.9.8+8

Also affects: Debian Linux 7.0, 8.0, Fedora 22, 23

Patches

🔴Vulnerability Details

2
GHSA
GHSA-qwj6-64m3-hwxr: The mod_dialback module in Prosody before 02022-05-17
OSV
CVE-2016-1232: The mod_dialback module in Prosody before 02016-01-12

📋Vendor Advisories

1
Debian
CVE-2016-1232: prosody - The mod_dialback module in Prosody before 0.9.9 does not properly generate rando...2016

💬Community

1
Bugzilla
CVE-2016-1232 prosody: use of weak PRNG in generation of dialback secrets2016-01-08
CVE-2016-1232 — Debian Prosody vulnerability | cvebase