Gentoo Logo

ejabberd: Multiple Denial of Service vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201206-10 / ejabberd
Release Date June 21, 2012
Latest Revision June 21, 2012: 1
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-im/ejabberd < 2.1.9 >= 2.1.9 All supported architectures

Related bugreports: #308047, #370201, #386075


Multiple vulnerabilities have been found in ejabberd, the worst of which allowing for remote Denial of Service.

2.  Impact Information


ejabberd is the Erlang jabber daemon.


Multiple vulnerabilities have been discovered in ejabberd. Please review the CVE identifiers referenced below for details.


ejabberd allows remote attackers to cause a Denial of Service condition with the result of either crashing the daemon or the whole system by causing memory and CPU consumption.

3.  Resolution Information


There is no known workaround at this time.


All ejabberd users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-im/ejabberd-2.1.9"

4.  References


Page updated June 21, 2012

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.