Логотип exploitDog
bind:CVE-2022-41966
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-41966

Количество 7

Количество 7

ubuntu логотип

CVE-2022-41966

около 3 лет назад

XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.

CVSS3: 8.2
EPSS: Низкий
redhat логотип

CVE-2022-41966

около 3 лет назад

XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-41966

около 3 лет назад

XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.

CVSS3: 8.2
EPSS: Низкий
debian логотип

CVE-2022-41966

около 3 лет назад

XStream serializes Java objects to XML and back again. Versions prior ...

CVSS3: 8.2
EPSS: Низкий
github логотип

GHSA-j563-grx4-pjpv

около 3 лет назад

XStream can cause Denial of Service via stack overflow

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2023-05627

около 3 лет назад

Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream платформы виртуализации VMware Cloud Foundation, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1673-1

почти 3 года назад

Security update for xstream

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-41966

XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.

CVSS3: 8.2
4%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-41966

XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.

CVSS3: 7.5
4%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-41966

XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.

CVSS3: 8.2
4%
Низкий
около 3 лет назад
debian логотип
CVE-2022-41966

XStream serializes Java objects to XML and back again. Versions prior ...

CVSS3: 8.2
4%
Низкий
около 3 лет назад
github логотип
GHSA-j563-grx4-pjpv

XStream can cause Denial of Service via stack overflow

CVSS3: 8.2
4%
Низкий
около 3 лет назад
fstec логотип
BDU:2023-05627

Уязвимость Java-библиотеки для преобразования объектов в XML или JSON формат XStream платформы виртуализации VMware Cloud Foundation, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
4%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2023:1673-1

Security update for xstream

почти 3 года назад

Уязвимостей на страницу