7.5
CWE
121 502 119
Advisory Published
CVE Published
Updated

CVE-2024-47072: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream

First published: Thu Nov 07 2024(Updated: )

### Impact The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. ### Patches XStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. ### Workarounds The only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2024-47072](https://x-stream.github.io/CVE-2024-47072.html). ### Credits Alexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
maven/com.thoughtworks.xstream:xstream<1.4.21
1.4.21
IBM ApplinX<=11.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2024-47072?

    CVE-2024-47072 has a severity rating that indicates it could lead to a denial of service due to a stack overflow error.

  • How do I fix CVE-2024-47072?

    To fix CVE-2024-47072, update XStream to version 1.4.21 or a later version.

  • Who is affected by CVE-2024-47072?

    CVE-2024-47072 affects applications using the XStream library configured with the BinaryStreamDriver.

  • What are the consequences of CVE-2024-47072?

    The consequence of CVE-2024-47072 is that a remote attacker could exploit the vulnerability to terminate the application.

  • When was CVE-2024-47072 reported?

    CVE-2024-47072 was reported as a vulnerability affecting XStream, with details communicated through GitHub advisories.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203