Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3660

Опубликовано: 04 нояб. 2014
Источник: debian
EPSS Низкий

Описание

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2fixed2.9.1+dfsg1-5jessiepackage
libxml2fixed2.9.2+dfsg1-1package

Примечания

  • https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html

  • https://gitlab.gnome.org/GNOME/libxml2/-/commit/be2a7edaf289c5da74a4f9ed3a0b6c733e775230

  • Beware the upstream patch relies on other commits not

  • available in the squeeze/wheezy version (at least cff2546f that

  • changes how the ent->checked variable is used and likely a3f1e3e5 too)

EPSS

Процентиль: 89%
0.04812
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.

redhat
почти 11 лет назад

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.

nvd
почти 11 лет назад

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.

github
больше 3 лет назад

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.

oracle-oval
почти 11 лет назад

ELSA-2014-1885: libxml2 security update (MODERATE)

EPSS

Процентиль: 89%
0.04812
Низкий