First published: Thu Oct 13 2022(Updated: )
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49858">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49858</a> <a href="https://github.com/x-stream/xstream/issues/304">https://github.com/x-stream/xstream/issues/304</a>
Affected Software | Affected Version | How to fix |
---|---|---|
XStream |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2134290 is considered critical due to its potential for Denial of Service attacks.
To fix REDHAT-BUG-2134290, update to the latest version of Xstream where the vulnerability has been addressed.
Users of Xstream that process user-supplied XML data are affected by REDHAT-BUG-2134290.
REDHAT-BUG-2134290 is associated with Denial of Service (DoS) attacks caused by stack overflow.
An attacker can exploit REDHAT-BUG-2134290 by supplying crafted XML data that triggers a stack overflow in the parser.