A vulnerability in the Smack XMPP library was reported where the security of the TLS connection is not always enforced. By stripping the "starttls" feature from the server response with a man-in-the-middle tool, an attacker can force the client to authenticate in clear text even if the "SecurityMode.required" TLS setting has been set. References: http://seclists.org/oss-sec/2016/q4/716 https://community.igniterealtime.org/blogs/ignite/2016/11/22/smack-security-advisory-2016-11-22 Upstream bug: https://issues.igniterealtime.org/browse/SMACK-739 Upstream patches: https://github.com/igniterealtime/Smack/commit/059ee99ba0d5ff7758829acf5a9aeede09ec820b https://github.com/igniterealtime/Smack/commit/a9d5cd4a611f47123f9561bc5a81a4555fe7cb04
Created smack tracking bugs for this issue: Affects: fedora-all [bug 1406704]
CVE assignment: http://seclists.org/oss-sec/2016/q4/739