CVE-2014-3660

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://rhn.redhat.com/errata/RHSA-2014-1655.html
http://rhn.redhat.com/errata/RHSA-2014-1885.html
http://secunia.com/advisories/59903
http://secunia.com/advisories/61965
http://secunia.com/advisories/61966
http://secunia.com/advisories/61991
http://www.debian.org/security/2014/dsa-3057
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
http://www.openwall.com/lists/oss-security/2014/10/17/7 Patch
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/70644
http://www.ubuntu.com/usn/USN-2389-1 Vendor Advisory
https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
https://bugzilla.redhat.com/show_bug.cgi?id=1149084
https://support.apple.com/kb/HT205030 Vendor Advisory
https://support.apple.com/kb/HT205031 Vendor Advisory
https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
http://rhn.redhat.com/errata/RHSA-2014-1655.html
http://rhn.redhat.com/errata/RHSA-2014-1885.html
http://secunia.com/advisories/59903
http://secunia.com/advisories/61965
http://secunia.com/advisories/61966
http://secunia.com/advisories/61991
http://www.debian.org/security/2014/dsa-3057
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
http://www.openwall.com/lists/oss-security/2014/10/17/7 Patch
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
http://www.securityfocus.com/bid/70644
http://www.ubuntu.com/usn/USN-2389-1 Vendor Advisory
https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
https://bugzilla.redhat.com/show_bug.cgi?id=1149084
https://support.apple.com/kb/HT205030 Vendor Advisory
https://support.apple.com/kb/HT205031 Vendor Advisory
https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 -
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html -
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html - () http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html -
References () http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html - () http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html -
References () http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html - () http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1655.html - () http://rhn.redhat.com/errata/RHSA-2014-1655.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1885.html - () http://rhn.redhat.com/errata/RHSA-2014-1885.html -
References () http://secunia.com/advisories/59903 - () http://secunia.com/advisories/59903 -
References () http://secunia.com/advisories/61965 - () http://secunia.com/advisories/61965 -
References () http://secunia.com/advisories/61966 - () http://secunia.com/advisories/61966 -
References () http://secunia.com/advisories/61991 - () http://secunia.com/advisories/61991 -
References () http://www.debian.org/security/2014/dsa-3057 - () http://www.debian.org/security/2014/dsa-3057 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:244 -
References () http://www.openwall.com/lists/oss-security/2014/10/17/7 - Patch () http://www.openwall.com/lists/oss-security/2014/10/17/7 - Patch
References () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html -
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html -
References () http://www.securityfocus.com/bid/70644 - () http://www.securityfocus.com/bid/70644 -
References () http://www.ubuntu.com/usn/USN-2389-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-2389-1 - Vendor Advisory
References () https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff - () https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1149084 - () https://bugzilla.redhat.com/show_bug.cgi?id=1149084 -
References () https://support.apple.com/kb/HT205030 - Vendor Advisory () https://support.apple.com/kb/HT205030 - Vendor Advisory
References () https://support.apple.com/kb/HT205031 - Vendor Advisory () https://support.apple.com/kb/HT205031 - Vendor Advisory
References () https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html - () https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html -

Information

Published : 2014-11-04 16:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3660

Mitre link : CVE-2014-3660

CVE.ORG link : CVE-2014-3660


JSON object : View

Products Affected

apple

  • mac_os_x

redhat

  • enterprise_linux

xmlsoft

  • libxml2

canonical

  • ubuntu_linux

debian

  • debian_linux