First published: Thu Sep 22 2022(Updated: )
Those using Xstream to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50393">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50393</a> <a href="https://github.com/x-stream/xstream/issues/304">https://github.com/x-stream/xstream/issues/304</a>
Affected Software | Affected Version | How to fix |
---|---|---|
XStream |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2128959 is categorized as high due to its potential for Denial of Service attacks.
To fix REDHAT-BUG-2128959, update your Xstream library to the latest version that contains the necessary security patches.
Users of Xstream who are serializing XML data with user-supplied input are affected by REDHAT-BUG-2128959.
REDHAT-BUG-2128959 facilitates Denial of Service attacks by exploiting stack overflow vulnerabilities in the XML parser.
A potential workaround for REDHAT-BUG-2128959 is to restrict user input and validate XML content before processing.