First published: Fri Jul 15 2016(Updated: )
It was discovered that the JAXP component of OpenJDK did not place a limit on the number of entity replacements performed when parsing XML files. A specially crafted XML document could cause a Java application using JAXP to consume an excessive amount of memory and CPU time when parsed. Updates correcting this issue address the problem by introducing a limit on the number of entity replacements that can be performed. The limit can be controlled using the jdk.xml.entityReplacementLimit system property.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle JDK 6 | =1.6.0-update115 | |
Oracle JDK 6 | =1.7.0-update101 | |
Oracle JDK 6 | =1.8.0-update91 | |
Oracle JDK 6 | =1.8.0-update92 | |
Oracle Java Runtime Environment (JRE) | =1.6.0-update115 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update101 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update91 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update92 | |
BEA JRockit | =r28.3.10 | |
Oracle Linux | =5.0 | |
Oracle Linux | =6 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3508 has a moderate severity rating due to its potential to consume excessive memory and CPU resources.
To fix CVE-2016-3508, users should update to the latest versions of affected JDK and JRE releases as provided by Oracle.
CVE-2016-3508 affects various versions of Oracle JDK, JRE, and Oracle Linux.
The risks of CVE-2016-3508 include possible denial of service due to excessive resource consumption during XML parsing.
To identify vulnerability to CVE-2016-3508, check if your system is running any affected versions of Oracle JDK or JRE.