Lucene search

K
nvd[email protected]NVD:CVE-2014-3660
HistoryNov 04, 2014 - 4:55 p.m.

CVE-2014-3660

2014-11-0416:55:06
web.nvd.nist.gov
1

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.2 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.6%

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the “billion laughs” attack.

Affected configurations

NVD
Node
xmlsoftlibxml2Range2.9.1
OR
xmlsoftlibxml2Match2.0.0
OR
xmlsoftlibxml2Match2.1.0
OR
xmlsoftlibxml2Match2.1.1
OR
xmlsoftlibxml2Match2.2.0
OR
xmlsoftlibxml2Match2.2.0beta
OR
xmlsoftlibxml2Match2.2.1
OR
xmlsoftlibxml2Match2.2.2
OR
xmlsoftlibxml2Match2.2.3
OR
xmlsoftlibxml2Match2.2.4
OR
xmlsoftlibxml2Match2.2.5
OR
xmlsoftlibxml2Match2.2.6
OR
xmlsoftlibxml2Match2.2.7
OR
xmlsoftlibxml2Match2.2.8
OR
xmlsoftlibxml2Match2.2.9
OR
xmlsoftlibxml2Match2.2.10
OR
xmlsoftlibxml2Match2.2.11
OR
xmlsoftlibxml2Match2.3.0
OR
xmlsoftlibxml2Match2.3.1
OR
xmlsoftlibxml2Match2.3.2
OR
xmlsoftlibxml2Match2.3.3
OR
xmlsoftlibxml2Match2.3.4
OR
xmlsoftlibxml2Match2.3.5
OR
xmlsoftlibxml2Match2.3.6
OR
xmlsoftlibxml2Match2.3.7
OR
xmlsoftlibxml2Match2.3.8
OR
xmlsoftlibxml2Match2.3.9
OR
xmlsoftlibxml2Match2.3.10
OR
xmlsoftlibxml2Match2.3.11
OR
xmlsoftlibxml2Match2.3.12
OR
xmlsoftlibxml2Match2.3.13
OR
xmlsoftlibxml2Match2.3.14
OR
xmlsoftlibxml2Match2.4.1
OR
xmlsoftlibxml2Match2.4.2
OR
xmlsoftlibxml2Match2.4.3
OR
xmlsoftlibxml2Match2.4.4
OR
xmlsoftlibxml2Match2.4.5
OR
xmlsoftlibxml2Match2.4.6
OR
xmlsoftlibxml2Match2.4.7
OR
xmlsoftlibxml2Match2.4.8
OR
xmlsoftlibxml2Match2.4.9
OR
xmlsoftlibxml2Match2.4.10
OR
xmlsoftlibxml2Match2.4.11
OR
xmlsoftlibxml2Match2.4.12
OR
xmlsoftlibxml2Match2.4.13
OR
xmlsoftlibxml2Match2.4.14
OR
xmlsoftlibxml2Match2.4.15
OR
xmlsoftlibxml2Match2.4.16
OR
xmlsoftlibxml2Match2.4.17
OR
xmlsoftlibxml2Match2.4.18
OR
xmlsoftlibxml2Match2.4.19
OR
xmlsoftlibxml2Match2.4.20
OR
xmlsoftlibxml2Match2.4.21
OR
xmlsoftlibxml2Match2.4.22
OR
xmlsoftlibxml2Match2.4.23
OR
xmlsoftlibxml2Match2.4.24
OR
xmlsoftlibxml2Match2.4.25
OR
xmlsoftlibxml2Match2.4.26
OR
xmlsoftlibxml2Match2.4.27
OR
xmlsoftlibxml2Match2.4.28
OR
xmlsoftlibxml2Match2.4.29
OR
xmlsoftlibxml2Match2.4.30
OR
xmlsoftlibxml2Match2.5.0
OR
xmlsoftlibxml2Match2.5.4
OR
xmlsoftlibxml2Match2.5.7
OR
xmlsoftlibxml2Match2.5.8
OR
xmlsoftlibxml2Match2.5.10
OR
xmlsoftlibxml2Match2.5.11
OR
xmlsoftlibxml2Match2.6.0
OR
xmlsoftlibxml2Match2.6.1
OR
xmlsoftlibxml2Match2.6.2
OR
xmlsoftlibxml2Match2.6.3
OR
xmlsoftlibxml2Match2.6.4
OR
xmlsoftlibxml2Match2.6.5
OR
xmlsoftlibxml2Match2.6.6
OR
xmlsoftlibxml2Match2.6.7
OR
xmlsoftlibxml2Match2.6.8
OR
xmlsoftlibxml2Match2.6.9
OR
xmlsoftlibxml2Match2.6.11
OR
xmlsoftlibxml2Match2.6.12
OR
xmlsoftlibxml2Match2.6.13
OR
xmlsoftlibxml2Match2.6.14
OR
xmlsoftlibxml2Match2.6.16
OR
xmlsoftlibxml2Match2.6.17
OR
xmlsoftlibxml2Match2.6.18
OR
xmlsoftlibxml2Match2.6.20
OR
xmlsoftlibxml2Match2.6.21
OR
xmlsoftlibxml2Match2.6.22
OR
xmlsoftlibxml2Match2.6.23
OR
xmlsoftlibxml2Match2.6.24
OR
xmlsoftlibxml2Match2.6.25
OR
xmlsoftlibxml2Match2.6.26
OR
xmlsoftlibxml2Match2.6.27
OR
xmlsoftlibxml2Match2.6.28
OR
xmlsoftlibxml2Match2.6.29
OR
xmlsoftlibxml2Match2.6.30
OR
xmlsoftlibxml2Match2.6.31
OR
xmlsoftlibxml2Match2.6.32
OR
xmlsoftlibxml2Match2.7.0
OR
xmlsoftlibxml2Match2.7.1
OR
xmlsoftlibxml2Match2.7.2
OR
xmlsoftlibxml2Match2.7.3
OR
xmlsoftlibxml2Match2.7.4
OR
xmlsoftlibxml2Match2.7.5
OR
xmlsoftlibxml2Match2.7.6
OR
xmlsoftlibxml2Match2.7.7
OR
xmlsoftlibxml2Match2.7.8
OR
xmlsoftlibxml2Match2.8.0
OR
xmlsoftlibxml2Match2.9.0
OR
xmlsoftlibxml2Match2.9.0rc1
Node
applemac_os_xRange10.10.4
OR
canonicalubuntu_linuxMatch10.04lts
OR
canonicalubuntu_linuxMatch12.04lts
OR
canonicalubuntu_linuxMatch14.04lts
OR
debiandebian_linuxMatch7.0
OR
redhatenterprise_linuxMatch5.0

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.2 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.6%