Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-8090

Опубликовано: 21 нояб. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

released

1.8.7.352-2ubuntu1.6
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

DNE

vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1.9.3.484-2ubuntu1.2]]
lucid

ignored

end of life
precise

released

1.9.3.0-1ubuntu2.10
trusty

released

1.9.3.484-2ubuntu1.2
trusty/esm

DNE

trusty was released [1.9.3.484-2ubuntu1.2]
upstream

needs-triage

utopic

ignored

end of life
vivid

ignored

end of life
vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [2.0.0.484-1ubuntu2.2]]
lucid

DNE

precise

DNE

trusty

released

2.0.0.484-1ubuntu2.2
trusty/esm

DNE

trusty was released [2.0.0.484-1ubuntu2.2]
upstream

needs-triage

utopic

released

2.0.0.484+really457-3ubuntu1.2
vivid

DNE

vivid/stable-phone-overlay

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.1.2-2ubuntu3
esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

released

2.1.2-2ubuntu1.2
vivid

released

2.1.2-2ubuntu3
vivid/stable-phone-overlay

DNE

Показывать по

EPSS

Процентиль: 92%
0.09242
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

nvd
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

debian
почти 11 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x befo ...

github
больше 3 лет назад

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

oracle-oval
почти 11 лет назад

ELSA-2014-1911: ruby security update (MODERATE)

EPSS

Процентиль: 92%
0.09242
Низкий

5 Medium

CVSS2