Lucene search

K
mageiaGentoo FoundationMGASA-2014-0550
HistoryDec 26, 2014 - 8:04 p.m.

Updated apache-poi packages fix security vulnerabilities

2014-12-2620:04:58
Gentoo Foundation
advisories.mageia.org
8

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.012 Low

EPSS

Percentile

84.8%

Updated apache-poi packages fix security vulnerabilities: It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks (CVE-2014-3529). It was found that Apache POI would expand an unlimited number of entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to trigger a denial of service attack via excessive CPU and memory consumption (CVE-2014-3574).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchapache-poi<ย 3.10.1-1apache-poi-3.10.1-1.mga4

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.012 Low

EPSS

Percentile

84.8%