A flaw was found in the way XMPP handled application-layer compression (XEP-0138). An attacker could send crafted XMPP stanzas to an XMPP server that supports application-layer compression, resulting in excessive CPU and memory consumption. Full details are available in the original report: http://xmpp.org/resources/security-notices/uncontrolled-resource-consumption-with-highly-compressed-xmpp-stanzas/ Although that report states jabberd and ejabberd are not affected, the versions in Fedora and EPEL appear to support XEP-0138 stream compression.
I do not know where the fix is, or how to test which version is vulnerable or not. Investiagations are ongoing. CVE request: http://www.openwall.com/lists/oss-security/2014/04/05/1
The prosody package in Fedora and EPEL may also be affected: http://www.debian.org/security/2014/dsa-2895
(In reply to Murray McAllister from comment #2) > The prosody package in Fedora and EPEL may also be affected: > http://www.debian.org/security/2014/dsa-2895 also from there, "The SAX XML parser lua-expat is also affected by this issues."
(In reply to Murray McAllister from comment #2) > The prosody package in Fedora and EPEL may also be affected: > http://www.debian.org/security/2014/dsa-2895 filed https://bugzilla.redhat.com/show_bug.cgi?id=1085692 for this issue in prosody.
Created jabberd tracking bugs for this issue: Affects: fedora-all [bug 1184157] Affects: epel-all [bug 1184158]
Created ejabberd tracking bugs for this issue: Affects: fedora-all [bug 1184159] Affects: epel-all [bug 1184160]