First published: Thu Nov 07 2024(Updated: )
### Impact The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. ### Patches XStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. ### Workarounds The only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2024-47072](https://x-stream.github.io/CVE-2024-47072.html). ### Credits Alexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.thoughtworks.xstream:xstream | <1.4.21 | 1.4.21 |
IBM ApplinX | <=11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47072 has a severity rating that indicates it could lead to a denial of service due to a stack overflow error.
To fix CVE-2024-47072, update XStream to version 1.4.21 or a later version.
CVE-2024-47072 affects applications using the XStream library configured with the BinaryStreamDriver.
The consequence of CVE-2024-47072 is that a remote attacker could exploit the vulnerability to terminate the application.
CVE-2024-47072 was reported as a vulnerability affecting XStream, with details communicated through GitHub advisories.