First published: Thu Oct 13 2022(Updated: )
Those using Xstream to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. <a href="https://github.com/x-stream/xstream/issues/304">https://github.com/x-stream/xstream/issues/304</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367</a>
Affected Software | Affected Version | How to fix |
---|---|---|
XStream |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2134292 is considered high as it may lead to Denial of Service attacks.
To fix REDHAT-BUG-2134292, ensure you update to the latest version of XStream that addresses this vulnerability.
The systems affected by REDHAT-BUG-2134292 are those using XStream for XML serialization.
REDHAT-BUG-2134292 can be exploited to perform Denial of Service attacks that cause the parser to crash.
Yes, user supplied input can trigger the vulnerability in REDHAT-BUG-2134292, leading to potential crashes.