parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-11-04 08:55
Updated : 2016-12-07 19:05
NVD link : CVE-2014-3660
Mitre link : CVE-2014-3660
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux
canonical
- ubuntu_linux
debian
- debian_linux
apple
- mac_os_x
xmlsoft
- libxml2