The Red Hat security response team reports:
A remotely exploitable DoS from XMPP client to ejabberd server via too many "client2server" messages (causing the message queue on the server to get overloaded, leading to server crash) has been found. [source]
A remotely exploitable DoS from XMPP client to ejabberd server via too many "client2server" messages (causing the message queue on the server to get overloaded, leading to server crash) has been found.
Copyright © 2003-2005 Jacques Vidrine and contributors. Please see the source of this document for full copyright information.