Lucene search

K
debianDebianDEBIAN:DLA-2693-1:27573
HistoryJun 28, 2021 - 2:14 p.m.

[SECURITY] [DLA 2693-1] xmlbeans security update

2021-06-2814:14:49
lists.debian.org
44
xmlbeans
update
xml entity expansion

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

9.2

Confidence

High

EPSS

0.004

Percentile

72.8%


Debian LTS Advisory DLA-2693-1 [email protected]
https://www.debian.org/lts/security/ Markus Koschany
June 28, 2021 https://wiki.debian.org/LTS

Package : xmlbeans
Version : 2.6.0+dfsg-1+deb9u1
CVE ID : CVE-2021-23926

The XML parsers used by XMLBeans did not set the properties needed to protect
the user from malicious XML input. Vulnerabilities include the possibility for
XML Entity Expansion attacks which could lead to a denial-of-service. This
update implements sensible defaults for the XML parsers to prevent these kind
of attacks.

For Debian 9 stretch, this problem has been fixed in version
2.6.0+dfsg-1+deb9u1.

We recommend that you upgrade your xmlbeans packages.

For the detailed security status of xmlbeans please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xmlbeans

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part

OSVersionArchitecturePackageVersionFilename
Debian9allxmlbeans< 2.6.0+dfsg-1+deb9u1xmlbeans_2.6.0+dfsg-1+deb9u1_all.deb
Debian9alllibxmlbeans-java< 2.6.0+dfsg-1+deb9u1libxmlbeans-java_2.6.0+dfsg-1+deb9u1_all.deb

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

9.2

Confidence

High

EPSS

0.004

Percentile

72.8%