First published: Wed Apr 12 2017(Updated: )
A vulnerability was found in XStream. Parsing a maliciously crafted file could cause the application to crash. The processed stream at unmarshalling type contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. The crash occurrs if this information advices XStream to create an instance of the primitive type 'void'. This situation can only happen if an attacker was able to manipulate the incoming data, since such an instance does not exist. References: <a href="http://seclists.org/oss-sec/2017/q2/9">http://seclists.org/oss-sec/2017/q2/9</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xstream Project Xstream | <=1.4.9 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
IBM GDE | <=3.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7957 is a vulnerability in XStream through 1.4.9 that allows for a denial of service attack.
CVE-2017-7957 manifests as a remote application crash when XStream mishandles attempts to create an instance of the primitive type 'void' during unmarshalling.
CVE-2017-7957 affects IBM GDE version 3.0.0.2, Xstream Project Xstream up to version 1.4.9, and Debian Debian Linux versions 8.0 and 9.0.
The severity of CVE-2017-7957 is high with a CVSS score of 7.5.
To mitigate CVE-2017-7957, apply the denyTypes workaround in XStream 1.4.9 or upgrade to a version that includes the fix.