Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-4227

Опубликовано: 15 янв. 2025
Источник: debian
EPSS Низкий

Описание

In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gsoapfixed2.8.135-1package
gsoapno-dsabookwormpackage
gsoappostponedbullseyepackage

Примечания

  • https://www.genivia.com/advisory.html#Upgrade_recommendation_when_option_-c++11_is_used_to_generate_C++11_source_code

  • https://www.genivia.com/changelog.html#Version_2.8.133_(03/21/2024)

  • Fixed by: https://sourceforge.net/p/gsoap2/code/222/

EPSS

Процентиль: 26%
0.00092
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.

CVSS3: 7.5
nvd
около 1 года назад

In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.

CVSS3: 7.5
github
около 1 года назад

In Genivia gSOAP with a specific configuration an unauthenticated remote attacker can generate a high CPU load when forcing to parse an XML having duplicate ID attributes which can lead to a DoS.

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость компонента XML Parser среды разработки программного обеспечения gSOAP, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 26%
0.00092
Низкий