There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/01/24/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20221028-0005/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/01/24/3 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20221028-0005/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2022/01/24/3 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl - Mailing List, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20221028-0005/ - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-835 |
Information
Published : 2022-01-24 15:15
Updated : 2024-11-21 06:48
NVD link : CVE-2022-23437
Mitre link : CVE-2022-23437
CVE.ORG link : CVE-2022-23437
JSON object : View
Products Affected
oracle
- financial_services_analytical_applications_infrastructure
- agile_engineering_data_management
- primavera_gateway
- banking_party_management
- peoplesoft_enterprise_peopletools
- financial_services_crime_and_compliance_management_studio
- financial_services_enterprise_case_management
- communications_session_route_manager
- communications_element_manager
- retail_financial_integration
- financial_services_behavior_detection_platform
- agile_plm
- retail_bulk_data_integration
- global_lifecycle_management_opatch
- product_lifecycle_analytics
- communications_session_report_manager
- weblogic_server
- global_lifecycle_management_nextgen_oui_framework
- retail_extract_transform_and_load
- retail_service_backbone
- banking_deposits_and_lines_of_credit_servicing
- ilearning
- health_sciences_information_manager
- retail_integration_bus
- communications_asap
- flexcube_universal_banking
- retail_merchandising_system
apache
- xerces-j
netapp
- active_iq_unified_manager
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')