First published: Thu Oct 13 2022(Updated: )
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50841">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50841</a> <a href="https://github.com/x-stream/xstream/issues/304">https://github.com/x-stream/xstream/issues/304</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Moonlight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2134288 is categorized as a Denial of Service vulnerability.
To fix REDHAT-BUG-2134288, ensure you are using a patched version of the Xstream library that addresses this vulnerability.
REDHAT-BUG-2134288 affects users of the Xstream library when handling user-supplied XML data.
While REDHAT-BUG-2134288 primarily leads to Denial of Service attacks, it can indirectly impact application availability and user access.
A potential workaround for REDHAT-BUG-2134288 is to avoid processing untrusted XML data with the vulnerable parser.