Lucene search

K
nvd[email protected]NVD:CVE-2014-8090
HistoryNov 21, 2014 - 3:59 p.m.

CVE-2014-8090

2014-11-2115:59:04
web.nvd.nist.gov

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.6 Medium

AI Score

Confidence

High

0.196 Low

EPSS

Percentile

96.3%

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

Affected configurations

NVD
Node
ruby-langrubyRange1.9.3p550
OR
ruby-langrubyMatch1.9.3
OR
ruby-langrubyMatch1.9.3p0
OR
ruby-langrubyMatch1.9.3p125
OR
ruby-langrubyMatch1.9.3p194
OR
ruby-langrubyMatch1.9.3p286
OR
ruby-langrubyMatch1.9.3p383
OR
ruby-langrubyMatch1.9.3p385
OR
ruby-langrubyMatch1.9.3p392
OR
ruby-langrubyMatch1.9.3p426
OR
ruby-langrubyMatch1.9.3p429
OR
ruby-langrubyMatch1.9.3p448
OR
ruby-langrubyMatch1.9.3p545
OR
ruby-langrubyMatch1.9.3p547
OR
ruby-langrubyMatch2.0.0
OR
ruby-langrubyMatch2.0.0p0
OR
ruby-langrubyMatch2.0.0p195
OR
ruby-langrubyMatch2.0.0p247
OR
ruby-langrubyMatch2.0.0p451
OR
ruby-langrubyMatch2.0.0p481
OR
ruby-langrubyMatch2.0.0p576
OR
ruby-langrubyMatch2.0.0p594
OR
ruby-langrubyMatch2.1.1
OR
ruby-langrubyMatch2.1.2
OR
ruby-langrubyMatch2.1.3
OR
ruby-langrubyMatch2.1.4

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.6 Medium

AI Score

Confidence

High

0.196 Low

EPSS

Percentile

96.3%