First published: Fri Jul 03 2015(Updated: )
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Spring Framework | <3.2.14 | 3.2.14 |
redhat/Spring Framework | <4.1.7 | 4.1.7 |
maven/org.springframework:spring-web | =5.0.0.RC2 | 5.0.0.RC3 |
maven/org.springframework:spring-web | >=4.0.0<4.1.7 | 4.1.7 |
maven/org.springframework:spring-web | <3.2.14 | 3.2.14 |
Spring Framework | =3.2.0 | |
Spring Framework | =3.2.1 | |
Spring Framework | =3.2.2 | |
Spring Framework | =3.2.3 | |
Spring Framework | =3.2.4 | |
Spring Framework | =3.2.5 | |
Spring Framework | =3.2.6 | |
Spring Framework | =3.2.7 | |
Spring Framework | =3.2.8 | |
Spring Framework | =3.2.9 | |
Spring Framework | =3.2.10 | |
Spring Framework | =3.2.11 | |
Spring Framework | =3.2.12 | |
Spring Framework | =3.2.13 | |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
Spring Framework | =4.1.0 | |
Spring Framework | =4.1.1 | |
Spring Framework | =4.1.2 | |
Spring Framework | =4.1.3 | |
Spring Framework | =4.1.4 | |
Spring Framework | =4.1.5 | |
Spring Framework | =4.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3192 is classified as a high-severity vulnerability due to its potential to cause denial of service through memory consumption.
To remediate CVE-2015-3192, update the Spring Framework to version 3.2.14 or 4.1.7 or later.
CVE-2015-3192 affects Spring Framework versions prior to 3.2.14 and 4.1.7.
CVE-2015-3192 allows remote attackers to exploit crafted XML files leading to denial of service.
Yes, upgrading to a patched version is the only effective solution to mitigate the risks associated with CVE-2015-3192.