First published: Wed Apr 12 2017(Updated: )
A vulnerability was found in XStream. Parsing a maliciously crafted file could cause the application to crash. The processed stream at unmarshalling type contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. The crash occurrs if this information advices XStream to create an instance of the primitive type 'void'. This situation can only happen if an attacker was able to manipulate the incoming data, since such an instance does not exist. References: <a href="http://seclists.org/oss-sec/2017/q2/9">http://seclists.org/oss-sec/2017/q2/9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Moonlight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1441538 is considered to be significant due to the potential for application crashes.
To fix REDHAT-BUG-1441538, you should update XStream to the latest version where the vulnerability has been addressed.
XStream is the affected software in the vulnerability identified by REDHAT-BUG-1441538.
REDHAT-BUG-1441538 enables an attack where a maliciously crafted file can cause the application to crash during parsing.
You can determine if your version of XStream is vulnerable to REDHAT-BUG-1441538 by checking if it is an outdated version and cross-referencing with security advisories.