Remotely exploitable DoS from XMPP client to ejabberd server via flood of "client2server" messages (causing the message queue on the server to get overloaded, leading to server crash) has been found. Track of the incident: https://support.process-one.net/browse/EJAB-1173 Upstream patches against v2.1: https://forge.process-one.net/rdiff/ejabberd/branches/ejabberd-2.1.x/src/configure?r1=2688&r2=2936&u&N https://forge.process-one.net/rdiff/ejabberd/branches/ejabberd-2.1.x/src/ejabberd_c2s.erl?r1=2911&r2=2936&u&N CVE Request: http://www.openwall.com/lists/oss-security/2010/01/29/1
*** Bug 559900 has been marked as a duplicate of this bug. ***
*** Bug 559893 has been marked as a duplicate of this bug. ***
*** Bug 559891 has been marked as a duplicate of this bug. ***
*** This bug has been marked as a duplicate of bug 559921 ***