First published: Thu Oct 09 2014(Updated: )
Apache POI is a library providing Java API for working with OOXML document<br>files.<br>It was found that Apache POI would resolve entities in OOXML documents.<br>A remote attacker able to supply OOXML documents that are parsed by Apache<br>POI could use this flaw to read files accessible to the user running the<br>application server, and potentially perform more advanced XML External<br>Entity (XXE) attacks. (CVE-2014-3529)<br>It was found that Apache POI would expand an unlimited number of entities<br>in OOXML documents. A remote attacker able to supply OOXML documents that<br>are parsed by Apache POI could use this flaw to trigger a denial of service<br>attack via excessive CPU and memory consumption. (CVE-2014-3574)<br>All users of Red Hat JBoss Fuse Service Works 6.0.0 as provided from the<br>Red Hat Customer Portal are advised to apply this security update.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache POI | ||
Red Hat JBoss Fuse Service Works |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2014:1370 is classified as moderate.
To fix RHSA-2014:1370, you need to update the Apache POI or Red Hat JBoss Fuse Service Works to the latest patched version.
RHSA-2014:1370 addresses a vulnerability in Apache POI that allows remote attackers to read arbitrary files via manipulated OOXML documents.
Yes, RHSA-2014:1370 can affect your Apache POI installation if it processes untrusted OOXML files.
RHSA-2014:1370 applies to all versions of Apache POI that handle OOXML documents without the appropriate security measures.