A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application.
The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1187 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
29 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application. The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input. | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.5 |
Information
Published : 2019-08-14 21:15
Updated : 2024-05-29 17:16
NVD link : CVE-2019-1187
Mitre link : CVE-2019-1187
CVE.ORG link : CVE-2019-1187
JSON object : View
Products Affected
microsoft
- windows_10
- windows_7
- windows_8.1
- windows_rt_8.1
- windows_server_2016
- windows_server_2019
- windows_server_2012
- windows_server_2008
CWE
CWE-611
Improper Restriction of XML External Entity Reference