Remotely exploitable DoS from XMPP client to ejabberd server via flood of "client2server" messages (causing the message queue on the server to get overloaded, leading to server crash) has been found. Track of the incident: https://support.process-one.net/browse/EJAB-1173 Upstream patches against v2.1: https://forge.process-one.net/rdiff/ejabberd/branches/ejabberd-2.1.x/src/configure?r1=2688&r2=2936&u&N https://forge.process-one.net/rdiff/ejabberd/branches/ejabberd-2.1.x/src/ejabberd_c2s.erl?r1=2911&r2=2936&u&N CVE Request: http://www.openwall.com/lists/oss-security/2010/01/29/1
*** This bug has been marked as a duplicate of bug 559921 ***