Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mdjIyLXhwMjYtbW05d84AAu59
Denial of Service due to parser crash
Withdrawn
This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue here for more information.
Original Despcription
Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
This vulnerability is only relevant for users making use of the DTD parsing functionality.
Permalink: https://github.com/advisories/GHSA-fv22-xp26-mm9wJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mdjIyLXhwMjYtbW05d84AAu59
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago Widthdrawn: almost 2 years ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-fv22-xp26-mm9w, CVE-2022-40153
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-40153
- https://github.com/x-stream/xstream/issues/304
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49858
- https://github.com/FasterXML/woodstox/issues/157
- https://github.com/FasterXML/woodstox/issues/160
- https://github.com/FasterXML/woodstox/pull/159
- https://github.com/advisories/GHSA-fv22-xp26-mm9w
Blast Radius: 24.6
Affected Packages
maven:com.fasterxml.woodstox:woodstox-core
Dependent packages: 645Dependent repositories: 1,896
Downloads:
Affected Version Ranges: < 5.4.0, >= 6.0.0, < 6.4.0
Fixed in: 5.4.0, 6.4.0
All affected versions: 5.0.0, 5.0.1, 5.0.2, 5.0.3, 5.1.0, 5.2.0, 5.2.1, 5.3.0, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.1.0, 6.1.1, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.3.0, 6.3.1
All unaffected versions: 5.4.0, 6.4.0, 6.5.0, 6.5.1, 6.6.0, 6.6.1, 6.6.2, 6.7.0, 7.0.0