JabberD 2.x: Multiple vulnerabilities Multiple vulnerabilities have been found in Gentoo's JabberD 2.x ebuild, the worst of which allows local attackers to escalate privileges. jabberd2 2018-03-19 2018-03-19 623806 629412 631068 local, remote 2.6.1

JabberD 2.x is an open source Jabber server written in C.

Multiple vulnerabilities have been discovered in Gentoo’s JabberD 2.x ebuild. Please review the referenced CVE identifiers for details.

An attacker could possibly escalate privileges by owning system binaries in trusted locations, cause a Denial of Service condition by manipulating the PID file from jabberd2 services, bypass security via SASL ANONYMOUS connections or have other unspecified impacts.

There is no known workaround at this time.

Gentoo has discontinued support for JabberD 2.x and recommends that users unmerge the package:

# emerge --unmerge "net-im/jabberd2"

As an alternative, users may want to upgrade their systems to use net-im/prosody instead of net-im/jabberd2.

CVE-2017-10807 CVE-2017-18225 CVE-2017-18226 whissi chrisadr