Lucene search

K
nvd[email protected]NVD:CVE-2014-5265
HistoryAug 18, 2014 - 11:15 a.m.

CVE-2014-5265

2014-08-1811:15:27
CWE-399
web.nvd.nist.gov
3

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7 High

AI Score

Confidence

High

0.436 Medium

EPSS

Percentile

97.4%

The Incutio XML-RPC (IXR) Library, as used in WordPress before 3.9.2 and Drupal 6.x before 6.33 and 7.x before 7.31, permits entity declarations without considering recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.

Affected configurations

NVD
Node
wordpresswordpressRange3.9.1
OR
wordpresswordpressMatch3.0
OR
wordpresswordpressMatch3.0.1
OR
wordpresswordpressMatch3.0.2
OR
wordpresswordpressMatch3.0.3
OR
wordpresswordpressMatch3.0.4
OR
wordpresswordpressMatch3.0.5
OR
wordpresswordpressMatch3.0.6
OR
wordpresswordpressMatch3.1
OR
wordpresswordpressMatch3.1.1
OR
wordpresswordpressMatch3.1.2
OR
wordpresswordpressMatch3.1.3
OR
wordpresswordpressMatch3.1.4
OR
wordpresswordpressMatch3.2
OR
wordpresswordpressMatch3.2beta1
OR
wordpresswordpressMatch3.2.1
OR
wordpresswordpressMatch3.3
OR
wordpresswordpressMatch3.3.1
OR
wordpresswordpressMatch3.3.2
OR
wordpresswordpressMatch3.3.3
OR
wordpresswordpressMatch3.4.0
OR
wordpresswordpressMatch3.4.1
OR
wordpresswordpressMatch3.4.2
OR
wordpresswordpressMatch3.5.0
OR
wordpresswordpressMatch3.5.1
OR
wordpresswordpressMatch3.6
OR
wordpresswordpressMatch3.6.1
OR
wordpresswordpressMatch3.7
OR
wordpresswordpressMatch3.7.1
OR
wordpresswordpressMatch3.8
OR
wordpresswordpressMatch3.8.1
OR
wordpresswordpressMatch3.9.0
Node
drupaldrupalMatch6.0
OR
drupaldrupalMatch6.0beta1
OR
drupaldrupalMatch6.0beta2
OR
drupaldrupalMatch6.0beta3
OR
drupaldrupalMatch6.0beta4
OR
drupaldrupalMatch6.0dev
OR
drupaldrupalMatch6.0rc1
OR
drupaldrupalMatch6.0rc2
OR
drupaldrupalMatch6.0rc3
OR
drupaldrupalMatch6.0rc4
OR
drupaldrupalMatch6.1
OR
drupaldrupalMatch6.2
OR
drupaldrupalMatch6.3
OR
drupaldrupalMatch6.4
OR
drupaldrupalMatch6.5
OR
drupaldrupalMatch6.6
OR
drupaldrupalMatch6.7
OR
drupaldrupalMatch6.8
OR
drupaldrupalMatch6.9
OR
drupaldrupalMatch6.10
OR
drupaldrupalMatch6.11
OR
drupaldrupalMatch6.12
OR
drupaldrupalMatch6.13
OR
drupaldrupalMatch6.14
OR
drupaldrupalMatch6.15
OR
drupaldrupalMatch6.16
OR
drupaldrupalMatch6.17
OR
drupaldrupalMatch6.18
OR
drupaldrupalMatch6.19
OR
drupaldrupalMatch6.20
OR
drupaldrupalMatch6.21
OR
drupaldrupalMatch6.22
OR
drupaldrupalMatch6.23
OR
drupaldrupalMatch6.24
OR
drupaldrupalMatch6.25
OR
drupaldrupalMatch6.26
OR
drupaldrupalMatch6.27
OR
drupaldrupalMatch6.28
OR
drupaldrupalMatch6.29
OR
drupaldrupalMatch6.30
OR
drupaldrupalMatch6.31
OR
drupaldrupalMatch6.32
OR
drupaldrupalMatch7.0
OR
drupaldrupalMatch7.0alpha1
OR
drupaldrupalMatch7.0alpha2
OR
drupaldrupalMatch7.0alpha3
OR
drupaldrupalMatch7.0alpha4
OR
drupaldrupalMatch7.0alpha5
OR
drupaldrupalMatch7.0alpha6
OR
drupaldrupalMatch7.0alpha7
OR
drupaldrupalMatch7.0beta1
OR
drupaldrupalMatch7.0beta2
OR
drupaldrupalMatch7.0beta3
OR
drupaldrupalMatch7.0dev
OR
drupaldrupalMatch7.0rc1
OR
drupaldrupalMatch7.0rc2
OR
drupaldrupalMatch7.0rc3
OR
drupaldrupalMatch7.0rc4
OR
drupaldrupalMatch7.1
OR
drupaldrupalMatch7.2
OR
drupaldrupalMatch7.3
OR
drupaldrupalMatch7.4
OR
drupaldrupalMatch7.5
OR
drupaldrupalMatch7.6
OR
drupaldrupalMatch7.7
OR
drupaldrupalMatch7.8
OR
drupaldrupalMatch7.9
OR
drupaldrupalMatch7.10
OR
drupaldrupalMatch7.11
OR
drupaldrupalMatch7.12
OR
drupaldrupalMatch7.13
OR
drupaldrupalMatch7.14
OR
drupaldrupalMatch7.15
OR
drupaldrupalMatch7.16
OR
drupaldrupalMatch7.17
OR
drupaldrupalMatch7.18
OR
drupaldrupalMatch7.19
OR
drupaldrupalMatch7.20
OR
drupaldrupalMatch7.21
OR
drupaldrupalMatch7.22
OR
drupaldrupalMatch7.23
OR
drupaldrupalMatch7.24
OR
drupaldrupalMatch7.25
OR
drupaldrupalMatch7.26
OR
drupaldrupalMatch7.27
OR
drupaldrupalMatch7.28
OR
drupaldrupalMatch7.29
OR
drupaldrupalMatch7.30
OR
drupaldrupalMatch7.x-dev
Node
debiandebian_linuxMatch7.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7 High

AI Score

Confidence

High

0.436 Medium

EPSS

Percentile

97.4%