parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2014-11-04 16:55
Updated : 2016-12-08 03:05
NVD link : CVE-2014-3660
Mitre link : CVE-2014-3660
CVE.ORG link : CVE-2014-3660
JSON object : View
Products Affected
xmlsoft
- libxml2
apple
- mac_os_x
canonical
- ubuntu_linux
redhat
- enterprise_linux
debian
- debian_linux
CWE