CVE-2016-0756 prosody


2017-12-29 23:00
2017-12-29 21:03
2017-06-18 07:03
2017-06-16 19:17
2017-04-01 19:11
2017-01-05 20:16


The generate_dialback function in the mod_dialback module in Prosody before 0.9.10 does not properly separate fields when generating dialback keys, which allows remote attackers to spoof XMPP network domains via a crafted stream id and domain name that is included in the target domain as a suffix.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster prosody 0.9.10-1
jessie prosody 0.9.7-2+deb8u3
sid prosody 0.9.10-1
stretch prosody 0.9.10-1
wheezy prosody 0.8.2-4+deb7u4