Описание
Denial of Service via stack overflow
Withdrawn
This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue here for more information.
Original Despcription
Those using FasterXML/woodstox to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
This vulnerability is only relevant for users making use of the DTD parsing functionality.
Ссылки
Пакеты
com.fasterxml.woodstox:woodstox-core
>= 6.0.0, < 6.4.0
6.4.0
com.fasterxml.woodstox:woodstox-core
< 5.4.0
5.4.0
CVE ID
Дефекты
Связанные уязвимости
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.
A flaw was found in the XStream package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.