Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-47072

Опубликовано: 07 нояб. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

A flaw was found in the XStream library. A remote attacker may trigger a denial of service by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. This issue may lead to the termination of the application.

Отчет

This vulnerability in XStream is considered an Important severity rather than Moderate because it exposes applications to a denial of service (DoS) attack with relative ease. By exploiting the flaw in the BinaryStreamDriver, an attacker can manipulate the binary input stream to trigger a stack overflow, which terminates the application unexpectedly. Unlike moderate vulnerabilities, which may require specific conditions or limited privileges, this flaw enables remote attackers to forcefully terminate services by crafting malicious input, impacting system availability. Additionally, the vulnerability’s reliance on a common serialization mechanism elevates the risk, as it may affect applications across various environments and industries where XStream is deployed.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientscom.thoughtworks.xstream/xstreamAffected
A-MQ Clients 2com.thoughtworks.xstream/xstreamNot affected
Cryostat 3com.thoughtworks.xstream/xstreamAffected
Logging Subsystem for Red Hat OpenShiftcom.thoughtworks.xstream/xstreamNot affected
Red Hat build of Apache Camel 4 for Quarkus 3com.thoughtworks.xstream/xstreamNot affected
Red Hat build of Apache Camel for Spring Boot 3com.thoughtworks.xstream/xstreamWill not fix
Red Hat build of Apache Camel - HawtIO 4com.thoughtworks.xstream/xstreamNot affected
Red Hat build of Apicurio Registry 2com.thoughtworks.xstream/xstreamNot affected
Red Hat build of Debezium 2com.thoughtworks.xstream/xstreamWill not fix
Red Hat build of OptaPlanner 8com.thoughtworks.xstream/xstreamWill not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2324606com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream

EPSS

Процентиль: 57%
0.00354
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

CVSS3: 7.5
nvd
около 1 года назад

XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

CVSS3: 7.5
debian
около 1 года назад

XStream is a simple library to serialize objects to XML and back again ...

suse-cvrf
около 1 года назад

Security update for bea-stax, xstream

CVSS3: 7.5
github
около 1 года назад

XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream

EPSS

Процентиль: 57%
0.00354
Низкий

7.5 High

CVSS3