Описание
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libxstream-java | unfixed | package |
Примечания
https://github.com/x-stream/xstream/issues/304
https://github.com/x-stream/xstream/issues/314
https://x-stream.github.io/CVE-2022-40151.html
https://github.com/advisories/GHSA-f8cc-g7j8-xxpm
Only solution for the issue is to catch the StackOverflowError in the client code
calling XStream.
EPSS
Связанные уязвимости
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
XStream can cause a Denial of Service by injecting deeply nested objects raising a stack overflow
Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании
EPSS