First published: Thu Oct 13 2022(Updated: )
Those using Xstream to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50428">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50428</a> <a href="https://github.com/x-stream/xstream/issues/304">https://github.com/x-stream/xstream/issues/304</a>
Affected Software | Affected Version | How to fix |
---|---|---|
XStream |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2134289 is considered high due to the potential for Denial of Service attacks.
To fix REDHAT-BUG-2134289, update to the latest version of the Xstream library that contains the security patch.
Anyone using the Xstream library for XML data serialization is potentially affected by REDHAT-BUG-2134289.
REDHAT-BUG-2134289 involves a Denial of Service (DoS) attack due to stack overflow vulnerabilities.
Attackers can exploit REDHAT-BUG-2134289 by supplying malicious XML content that can cause the parser to crash.