CWE
399
Advisory Published
Updated

CVE-2014-5265

First published: Mon Aug 18 2014(Updated: )

The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, permits entity declarations without considering recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
WordPress WordPress<=3.9.1
WordPress WordPress=3.0
WordPress WordPress=3.0.1
WordPress WordPress=3.0.2
WordPress WordPress=3.0.3
WordPress WordPress=3.0.4
WordPress WordPress=3.0.5
WordPress WordPress=3.0.6
WordPress WordPress=3.1
WordPress WordPress=3.1.1
WordPress WordPress=3.1.2
WordPress WordPress=3.1.3
WordPress WordPress=3.1.4
WordPress WordPress=3.2
WordPress WordPress=3.2-beta1
WordPress WordPress=3.2.1
WordPress WordPress=3.3
WordPress WordPress=3.3.1
WordPress WordPress=3.3.2
WordPress WordPress=3.3.3
WordPress WordPress=3.4.0
WordPress WordPress=3.4.1
WordPress WordPress=3.4.2
WordPress WordPress=3.5.0
WordPress WordPress=3.5.1
WordPress WordPress=3.6
WordPress WordPress=3.6.1
WordPress WordPress=3.7
WordPress WordPress=3.7.1
WordPress WordPress=3.8
WordPress WordPress=3.8.1
WordPress WordPress=3.9.0
Drupal Drupal=6.0
Drupal Drupal=6.0-beta1
Drupal Drupal=6.0-beta2
Drupal Drupal=6.0-beta3
Drupal Drupal=6.0-beta4
Drupal Drupal=6.0-dev
Drupal Drupal=6.0-rc1
Drupal Drupal=6.0-rc2
Drupal Drupal=6.0-rc3
Drupal Drupal=6.0-rc4
Drupal Drupal=6.1
Drupal Drupal=6.2
Drupal Drupal=6.3
Drupal Drupal=6.4
Drupal Drupal=6.5
Drupal Drupal=6.6
Drupal Drupal=6.7
Drupal Drupal=6.8
Drupal Drupal=6.9
Drupal Drupal=6.10
Drupal Drupal=6.11
Drupal Drupal=6.12
Drupal Drupal=6.13
Drupal Drupal=6.14
Drupal Drupal=6.15
Drupal Drupal=6.16
Drupal Drupal=6.17
Drupal Drupal=6.18
Drupal Drupal=6.19
Drupal Drupal=6.20
Drupal Drupal=6.21
Drupal Drupal=6.22
Drupal Drupal=6.23
Drupal Drupal=6.24
Drupal Drupal=6.25
Drupal Drupal=6.26
Drupal Drupal=6.27
Drupal Drupal=6.28
Drupal Drupal=6.29
Drupal Drupal=6.30
Drupal Drupal=6.31
Drupal Drupal=6.32
Drupal Drupal=7.0
Drupal Drupal=7.0-alpha1
Drupal Drupal=7.0-alpha2
Drupal Drupal=7.0-alpha3
Drupal Drupal=7.0-alpha4
Drupal Drupal=7.0-alpha5
Drupal Drupal=7.0-alpha6
Drupal Drupal=7.0-alpha7
Drupal Drupal=7.0-beta1
Drupal Drupal=7.0-beta2
Drupal Drupal=7.0-beta3
Drupal Drupal=7.0-dev
Drupal Drupal=7.0-rc1
Drupal Drupal=7.0-rc2
Drupal Drupal=7.0-rc3
Drupal Drupal=7.0-rc4
Drupal Drupal=7.1
Drupal Drupal=7.2
Drupal Drupal=7.3
Drupal Drupal=7.4
Drupal Drupal=7.5
Drupal Drupal=7.6
Drupal Drupal=7.7
Drupal Drupal=7.8
Drupal Drupal=7.9
Drupal Drupal=7.10
Drupal Drupal=7.11
Drupal Drupal=7.12
Drupal Drupal=7.13
Drupal Drupal=7.14
Drupal Drupal=7.15
Drupal Drupal=7.16
Drupal Drupal=7.17
Drupal Drupal=7.18
Drupal Drupal=7.19
Drupal Drupal=7.20
Drupal Drupal=7.21
Drupal Drupal=7.22
Drupal Drupal=7.23
Drupal Drupal=7.24
Drupal Drupal=7.25
Drupal Drupal=7.26
Drupal Drupal=7.27
Drupal Drupal=7.28
Drupal Drupal=7.29
Drupal Drupal=7.30
Drupal Drupal=7.x-dev
Debian Debian Linux=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203