CVE-2016-10027: Smack allows the bypass of TLS protections
(updated )
Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode.required TLS setting has been set, allows man-in-the-middle attackers to bypass TLS protections and trigger use of cleartext for client authentication by stripping the “starttls” feature from a server response.
References
- community.igniterealtime.org/blogs/ignite/2016/11/22/smack-security-advisory-2016-11-22
- github.com/advisories/GHSA-66pq-hqv5-228g
- github.com/igniterealtime/Smack
- github.com/igniterealtime/Smack/commit/059ee99ba0d5ff7758829acf5a9aeede09ec820b
- github.com/igniterealtime/Smack/commit/a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
- issues.igniterealtime.org/projects/SMACK/issues/SMACK-739
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4WXAZ4JVJXHMEDDXJVWJHPVBF5QCTZF
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4WXAZ4JVJXHMEDDXJVWJHPVBF5QCTZF
- nvd.nist.gov/vuln/detail/CVE-2016-10027
Code Behaviors & Features
Detect and mitigate CVE-2016-10027 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →