Vulnerabilites related to apache - poi
cve-2016-5000
Vulnerability from cvelistv5
Published
2016-08-05 14:00
Modified
2024-08-06 00:46
Severity ?
EPSS score ?
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/538981/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/92100 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1037741 | vdb-entry, x_refsource_SECTRACK | |
https://lists.apache.org/list.html?user%40poi.apache.org | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC | |
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:46:40.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "name": "92100", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92100" }, { "name": "1037741", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037741" }, { "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "name": "92100", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92100" }, { "name": "1037741", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037741" }, { "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-5000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "name": "92100", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92100" }, { "name": "1037741", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037741" }, { "name": "[users] 20160722 [CVE-2016-5000] XML External Entity (XXE) Vulnerability in Apache POI\u0027s XLSX2CSV Example", "refsource": "MLIST", "url": "https://lists.apache.org/list.html?user@poi.apache.org" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-5000", "datePublished": "2016-08-05T14:00:00", "dateReserved": "2016-05-24T00:00:00", "dateUpdated": "2024-08-06T00:46:40.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3574
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "69648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/changes.html" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60419" }, { "name": "apache-poi-cve20143574-dos(95768)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "69648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/changes.html" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60419" }, { "name": "apache-poi-cve20143574-dos(95768)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "69648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69648" }, { "name": "http://poi.apache.org/changes.html", "refsource": "CONFIRM", "url": "http://poi.apache.org/changes.html" }, { "name": "61766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61766" }, { "name": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", "refsource": "CONFIRM", "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "RHSA-2014:1370", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "name": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", "refsource": "CONFIRM", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60419" }, { "name": "apache-poi-cve20143574-dos(95768)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "name": "RHSA-2014:1400", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "RHSA-2014:1398", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3574", "datePublished": "2014-09-04T17:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0213
Vulnerability from cvelistv5
Published
2012-08-07 21:00
Modified
2024-08-06 18:16
Severity ?
EPSS score ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | x_refsource_CONFIRM | |
http://secunia.com/advisories/49040 | third-party-advisory, x_refsource_SECUNIA | |
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2468 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/50549 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/53487 | vdb-entry, x_refsource_BID | |
http://rhn.redhat.com/errata/RHSA-2012-1232.html | vendor-advisory, x_refsource_REDHAT | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:094 | vendor-advisory, x_refsource_MANDRIVA | |
https://bugzilla.redhat.com/show_bug.cgi?id=799078 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:19.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "49040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "name": "DSA-2468", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2468" }, { "name": "50549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50549" }, { "name": "FEDORA-2012-10835", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "name": "53487", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53487" }, { "name": "RHSA-2012:1232", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "MDVSA-2013:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-10T21:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "49040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "name": "DSA-2468", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2468" }, { "name": "50549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50549" }, { "name": "FEDORA-2012-10835", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "name": "53487", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53487" }, { "name": "RHSA-2012:1232", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "MDVSA-2013:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2012-0213", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "49040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49040" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044", "refsource": "CONFIRM", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "name": "DSA-2468", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2468" }, { "name": "50549", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50549" }, { "name": "FEDORA-2012-10835", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "name": "53487", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53487" }, { "name": "RHSA-2012:1232", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "MDVSA-2013:094", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=799078", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2012-0213", "datePublished": "2012-08-07T21:00:00", "dateReserved": "2011-12-14T00:00:00", "dateUpdated": "2024-08-06T18:16:19.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3529
Vulnerability from cvelistv5
Published
2014-09-04 17:00
Modified
2024-08-06 10:50
Severity ?
EPSS score ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:16.343Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/changes.html" }, { "name": "78018", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78018" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "apache-poi-cve20143529-info-disc(95770)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/60419" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "69647", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69647" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/changes.html" }, { "name": "78018", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/78018" }, { "name": "61766", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "apache-poi-cve20143529-info-disc(95770)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "name": "RHSA-2014:1370", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/60419" }, { "name": "RHSA-2014:1400", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "69647", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69647" }, { "name": "RHSA-2014:1398", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3529", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "http://poi.apache.org/changes.html", "refsource": "CONFIRM", "url": "http://poi.apache.org/changes.html" }, { "name": "78018", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78018" }, { "name": "61766", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61766" }, { "name": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations", "refsource": "CONFIRM", "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "name": "apache-poi-cve20143529-info-disc(95770)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "name": "RHSA-2014:1370", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "name": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt", "refsource": "CONFIRM", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "name": "60419", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/60419" }, { "name": "RHSA-2014:1400", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "name": "69647", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69647" }, { "name": "RHSA-2014:1398", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "name": "59943", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59943" }, { "name": "RHSA-2014:1399", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3529", "datePublished": "2014-09-04T17:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:16.343Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12415
Vulnerability from cvelistv5
Published
2019-10-23 19:27
Modified
2024-08-04 23:17
Severity ?
EPSS score ?
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Apache POI |
Version: Apache POI up to 4.1.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:40.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache POI", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Apache POI up to 4.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-20T10:38:23", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2019-12415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache POI", "version": { "version_data": [ { "version_value": "Apache POI up to 4.1.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "[tika-user] 20191105 Is tika-parsers exposed to CVE-2019-12415", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c@%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191105 Re: Is tika-parsers exposed to CVE-2019-12415", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007@%3Cuser.tika.apache.org%3E" }, { "name": "[tika-user] 20191106 Re: Is tika-parsers exposed to CVE-2019-12415", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c@%3Cuser.tika.apache.org%3E" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e@%3Cannounce.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "name": "https://www.oracle.com//security-alerts/cpujul2021.html", "refsource": "MISC", "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2019-12415", "datePublished": "2019-10-23T19:27:20", "dateReserved": "2019-05-28T00:00:00", "dateUpdated": "2024-08-04T23:17:40.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5644
Vulnerability from cvelistv5
Published
2017-03-24 14:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96983 | vdb-entry, x_refsource_BID | |
https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC | |
http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache POI |
Version: before 3.15 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:47.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96983", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96983" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache POI", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "before 3.15" } ] } ], "datePublic": "2017-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "XXE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "96983", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96983" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2017-5644", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache POI", "version": { "version_data": [ { "version_value": "before 3.15" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XXE" } ] } ] }, "references": { "reference_data": [ { "name": "96983", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96983" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15", "refsource": "CONFIRM", "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-5644", "datePublished": "2017-03-24T14:00:00", "dateReserved": "2017-01-29T00:00:00", "dateUpdated": "2024-08-05T15:11:47.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26336
Vulnerability from cvelistv5
Published
2022-03-04 00:00
Modified
2024-08-03 05:03
Severity ?
EPSS score ?
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | poi-scratchpad |
Version: unspecified < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:03:32.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "poi-scratchpad", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "5.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Apache POI would like to thank Craig Haft of Yahoo Inc. for reporting and providing a patch for this issue." } ], "descriptions": [ { "lang": "en", "value": "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1." } ], "metrics": [ { "other": { "content": { "other": "moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-28T00:00:00", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" } ], "source": { "defect": [ "https://bz.apache.org/bugzilla/show_bug.cgi?id=65899" ], "discovery": "UNKNOWN" }, "title": "A carefully crafted TNEF file can cause an out of memory exception", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-26336", "datePublished": "2022-03-04T00:00:00", "dateReserved": "2022-03-01T00:00:00", "dateUpdated": "2024-08-03T05:03:32.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12626
Vulnerability from cvelistv5
Published
2018-01-29 17:00
Modified
2024-09-16 18:45
Severity ?
EPSS score ?
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:1322 | vendor-advisory, x_refsource_REDHAT | |
https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/102879 | vdb-entry, x_refsource_BID | |
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | mailing-list, x_refsource_MLIST | |
https://www.oracle.com/security-alerts/cpuapr2020.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpujul2020.html | x_refsource_MISC | |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpujan2020.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpuoct2020.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpujan2021.html | x_refsource_MISC | |
https://www.oracle.com/security-alerts/cpuApr2021.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache POI |
Version: < 3.17 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.421Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:1322", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "name": "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI \u003c 3.17", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "name": "102879", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102879" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache POI", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "\u003c 3.17" } ] } ], "datePublic": "2018-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service Vulnerabilities", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-14T17:20:03", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "RHSA-2018:1322", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "name": "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI \u003c 3.17", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "name": "102879", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102879" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2018-01-26T00:00:00", "ID": "CVE-2017-12626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache POI", "version": { "version_data": [ { "version_value": "\u003c 3.17" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service Vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:1322", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "name": "[dev] 20180126 CVE-2017-12626 - Denial of Service Vulnerabilities in Apache POI \u003c 3.17", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E" }, { "name": "102879", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102879" }, { "name": "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "name": "https://www.oracle.com/security-alerts/cpuApr2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2017-12626", "datePublished": "2018-01-29T17:00:00Z", "dateReserved": "2017-08-07T00:00:00", "dateUpdated": "2024-09-16T18:45:21.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9527
Vulnerability from cvelistv5
Published
2015-01-06 15:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | x_refsource_CONFIRM | |
https://access.redhat.com/errata/RHSA-2016:1135 | vendor-advisory, x_refsource_REDHAT | |
http://poi.apache.org/changes.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/77726 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/61953 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html | vendor-advisory, x_refsource_FEDORA | |
https://issues.apache.org/bugzilla/show_bug.cgi?id=57272 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "RHSA-2016:1135", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://poi.apache.org/changes.html" }, { "name": "77726", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77726" }, { "name": "61953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61953" }, { "name": "FEDORA-2015-2090", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-29T00:00:00", "descriptions": [ { "lang": "en", "value": "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-02-10T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "RHSA-2016:1135", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://poi.apache.org/changes.html" }, { "name": "77726", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77726" }, { "name": "61953", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61953" }, { "name": "FEDORA-2015-2090", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9527", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "name": "RHSA-2016:1135", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "name": "http://poi.apache.org/changes.html", "refsource": "CONFIRM", "url": "http://poi.apache.org/changes.html" }, { "name": "77726", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77726" }, { "name": "61953", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61953" }, { "name": "FEDORA-2015-2090", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272", "refsource": "CONFIRM", "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9527", "datePublished": "2015-01-06T15:00:00", "dateReserved": "2015-01-06T00:00:00", "dateUpdated": "2024-08-06T13:47:41.391Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-01-29 17:29
Modified
2024-11-21 03:09
Severity ?
Summary
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C04149C-A260-4129-93DE-EA5815189C17", "versionEndExcluding": "3.17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: 1) Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294), and 2) Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)." }, { "lang": "es", "value": "Apache POI, en versiones anteriores al release 3.17, es vulnerable a ataques de denegaci\u00f3n de servicio (DoS): 1) bucles infinitos al analizar WMF, EMF, MSG y macros manipuladas (POI bugs 61338 y 61294); y 2) excepciones fuera de memoria al analizar DOC, PPT y XLS manipulados(POI bugs 52372 y 61295)." } ], "id": "CVE-2017-12626", "lastModified": "2024-11-21T03:09:55.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-29T17:29:00.410", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102879" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "security@apache.org", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b%40%3Cdev.poi.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-835" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-23 20:15
Modified
2024-11-21 04:22
Severity ?
Summary
In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D82A205-F4BE-4C18-A764-A2364B50BAD9", "versionEndIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "17EA8B91-7634-4636-B647-1049BA7CA088", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B4DF46F-DBCC-41F2-A260-F83A14838F23", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10F17843-32EA-4C31-B65C-F424447BEF7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_originations:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AB8ABFD-C72C-4CBB-8872-9440A19154D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_originations:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3054FEBB-484B-4927-9D1C-2024772E8B3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "5AED3C78-7D65-4F02-820D-B51BCE4022F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_product_manufacturing:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "557A23A1-4762-4D29-A478-D1670C1847D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_payments:14.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7BE6EB99-98BF-49A2-8890-829320607A1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FD48BA85-B6D3-4BFD-9B48-755494FF094E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2BEE49E-A5AA-42D3-B422-460454505480", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F4FF66F7-10C8-4A1C-910A-EF7D12A4284C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "35AD0C07-9688-4397-8D45-FBB88C0F0C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "8972497F-6E24-45A9-9A18-EB0E842CB1D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "400509A8-D6F2-432C-A2F1-AD5B8778D0D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "132CE62A-FBFC-4001-81EC-35D81F73AF48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "282150FF-C945-4A3E-8A80-E8757A8907EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB9FC9AB-1070-420F-870E-A5EC43A924A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:big_data_discovery:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "8C4C38FF-B75B-4DF1-BFB3-C91BDD10D90E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDA4C6-68BA-4090-9645-A1A3C526F86C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_diameter_signaling_router_idih\\::8.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "00F3F284-E638-495D-89D0-AEB0CCA969CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:endeca_information_discovery_studio:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D03A8C9-35A5-4B75-9711-7A4A60457307", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "36E39918-B2D6-43F0-A607-8FD8BFF6F340", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7582B307-3899-4BBB-B868-BC912A4D0109", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9E13DD9-F456-4802-84AD-A2A1F12FE999", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F940AA-05BE-426C-89A3-4098E107D9A7", "versionEndIncluding": "8.0.9", "versionStartIncluding": "8.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D5112-4055-4F89-A5B3-0DCB109481B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:financial_services_market_risk_measurement_and_management:8.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "D262848E-AA24-4057-A747-6221BA22ADF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6762F207-93C7-4363-B2F9-7A7C6F8AF993", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1B74B912-152D-4F38-9FC1-741D6D0B27FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "DED59B62-C9BF-4C0E-B351-3884E8441655", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*", "matchCriteriaId": "82EA4BA7-C38B-4AF3-8914-9E3D089EBDD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9C9BC66-FA5F-4774-9BDA-7AB88E2839C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*", "matchCriteriaId": "7F69B9A5-F21B-4904-9F27-95C0F7A628E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A570E5E-A3BC-4E19-BC44-C28D8BC9A537", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "991B23C1-83FA-40B1-AF0A-9A7B10A9EDA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_policy_administration_j2ee:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D56B4193-4DB7-4BD9-85FF-8665601E6D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AEDF91E2-E7B5-40EE-B71F-C7D59F4021BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A94F93C-5828-4D78-9C48-20AC17E72B8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3E25293-CB03-44CE-A8ED-04B3A0487A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F9721E3-EE25-4C8A-9E0A-E60D465E0A97", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:insurance_rules_palette:11.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E08D8FE6-2BB4-4FF6-8B42-2D47F6FBFDFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "335AB6A7-3B1F-4FA8-AF08-7D64C16C4B04", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:17.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "2F5647E5-B051-41A6-B186-3584C725908B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_gateway:18.8.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4A405B01-7DC5-41A0-9B61-C2DBE1C71A67", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*", "matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9", "versionEndIncluding": "17.12", "versionStartIncluding": "17.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*", "matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*", "matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*", "matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*", "matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_clearance_optimization_engine:14.0:*:*:*:*:*:*:*", "matchCriteriaId": "C8109973-AE49-4E2C-B3A0-DDB18674C1FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE8CF045-09BB-4069-BCEC-496D5AE3B780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*", "matchCriteriaId": "38E74E68-7F19-4EF3-AC00-3C249EAAA39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24A3C819-5151-4543-A5C6-998C9387C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FB98961-8C99-4490-A6B8-9A5158784F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6A4F71A-4269-40FC-8F61-1D1301F2B728", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A502118-5B2B-47AE-82EC-1999BD841103", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D551CAB1-4312-44AA-BDA8-A030817E153A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:webcenter_sites:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "174A6D2E-E42E-4C92-A194-C6A820CD7EF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache POI up to 4.1.0, when using the tool XSSFExportToXml to convert user-provided Microsoft Excel documents, a specially crafted document can allow an attacker to read files from the local filesystem or from internal network resources via XML External Entity (XXE) Processing." }, { "lang": "es", "value": "En Apache POI versiones hasta 4.1.0, cuando se utiliza la herramienta XSSFExportToXml para convertir documentos de Microsoft Excel proporcionados por el usuario, un documento especialmente dise\u00f1ado puede permitir a un atacante leer archivos del sistema de archivos local o de los recursos de la red interna por medio de un Procesamiento de Entidad Externa XML (XXE)." } ], "id": "CVE-2019-12415", "lastModified": "2024-11-21T04:22:47.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-23T20:15:12.707", "references": [ { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "source": "security@apache.org", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/13a54b6a03369cfb418a699180ffb83bd727320b6ddfec198b9b728e%40%3Cannounce.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/2ac0327748de0c2b3c1c012481b79936797c711724e0b7da83cf564c%40%3Cuser.tika.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/895164e03a3c327449069e2fd6ced0367561878b3ae6a8ec740c2007%40%3Cuser.tika.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/d88b8823867033514d7ec05d66f88c70dc207604d3dcbd44fd88464c%40%3Cuser.tika.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-07 21:55
Modified
2024-11-21 01:34
Severity ?
Summary
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
apache | poi | 0.1 | |
apache | poi | 0.2 | |
apache | poi | 0.3 | |
apache | poi | 0.4 | |
apache | poi | 0.5 | |
apache | poi | 0.6 | |
apache | poi | 0.7 | |
apache | poi | 0.10.0 | |
apache | poi | 0.11.0 | |
apache | poi | 0.12.0 | |
apache | poi | 0.13.0 | |
apache | poi | 0.14.0 | |
apache | poi | 1.0.0 | |
apache | poi | 1.0.1 | |
apache | poi | 1.0.2 | |
apache | poi | 1.1.0 | |
apache | poi | 1.2.0 | |
apache | poi | 1.5 | |
apache | poi | 1.5.1 | |
apache | poi | 1.7 | |
apache | poi | 1.8 | |
apache | poi | 1.10 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.0 | |
apache | poi | 2.5 | |
apache | poi | 2.5.1 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0 | |
apache | poi | 3.0.1 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.0.2 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.1 | |
apache | poi | 3.2 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.5 | |
apache | poi | 3.6 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.7 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 | |
apache | poi | 3.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CDF1F8B-7A6A-4938-A36C-02985A7299C9", "versionEndIncluding": "3.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document." }, { "lang": "es", "value": "La funci\u00f3n UnhandledDataStructure en hwpf/model/UnhandledDataStructure.java en Apache POI v3.8 y anteriores permite a atacantes remotos earlier provocar una denegaci\u00f3n de servicio (excepci\u00f3n OutOfMemoryError y posiblemente desestabilizaci\u00f3n JVM) mediante un valor de longitud manipulado en un Channel Definition Format (CDF) o en un documento Compound File Binary Format (CFBF)." } ], "id": "CVE-2012-0213", "lastModified": "2024-11-21T01:34:35.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-07T21:55:01.093", "references": [ { "source": "security@debian.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "source": "security@debian.org", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "source": "security@debian.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49040" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/50549" }, { "source": "security@debian.org", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2012/dsa-2468" }, { "source": "security@debian.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/53487" }, { "source": "security@debian.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" }, { "source": "security@debian.org", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-August/084609.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0044" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-04 16:15
Modified
2024-11-21 06:53
Severity ?
Summary
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j | Mailing List, Vendor Advisory | |
security@apache.org | https://security.netapp.com/advisory/ntap-20221028-0006/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221028-0006/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
apache | poi | * | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "A853FEC8-0927-4637-A352-BB91914AFFCD", "versionEndExcluding": "5.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*", "matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1." }, { "lang": "es", "value": "Un fallo en el paquete HMEF de poi-scratchpad (Apache POI) permite a un atacante causar una excepci\u00f3n de Falta de Memoria. Este paquete es usado para leer archivos TNEF (Microsoft Outlook y Microsoft Exchange Server). Si una aplicaci\u00f3n usa poi-scratchpad para analizar archivos TNEF y la aplicaci\u00f3n permite que usuarios no confiables los suministren, entonces un archivo cuidadosamente dise\u00f1ado puede causar una excepci\u00f3n de Falta de Memoria. Este problema afecta a versi\u00f3n 5.2.0 de poi-scratchpad y versiones anteriores. Es recomendado a usuarios actualizar a poi-scratchpad versi\u00f3n 5.2.1" } ], "id": "CVE-2022-26336", "lastModified": "2024-11-21T06:53:46.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-04T16:15:10.923", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221028-0006/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-770" } ], "source": "security@apache.org", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2015-01-06 15:59
Modified
2024-11-21 02:21
Severity ?
Summary
HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fedoraproject | fedora | 20 | |
apache | poi | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:beta3:*:*:*:*:*:*", "matchCriteriaId": "0E4D7997-8DE0-4D93-8C8C-E9D8EF6BC1F8", "versionEndIncluding": "3.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HSLFSlideShow in Apache POI before 3.11 allows remote attackers to cause a denial of service (infinite loop and deadlock) via a crafted PPT file." }, { "lang": "es", "value": "HSLFSlideShow en Apache POI anterior a 3.11 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y bloqueo) a trav\u00e9s de un fichero PPT manipulado." } ], "id": "CVE-2014-9527", "lastModified": "2024-11-21T02:21:06.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-01-06T15:59:05.727", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "source": "cve@mitre.org", "url": "http://poi.apache.org/changes.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/61953" }, { "source": "cve@mitre.org", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/77726" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "source": "cve@mitre.org", "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150228.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://poi.apache.org/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/77726" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2016:1135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=57272" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-08-05 14:59
Modified
2024-11-21 02:53
Severity ?
Summary
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A37C616-D64C-4067-91D5-0F288E4ABCEF", "versionEndIncluding": "3.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." }, { "lang": "es", "value": "El ejemplo XLSX2CSV en Apache POI en versiones anteriores a 3.14 permite a atacantes remotos leer archivos arbitrarios a trav\u00e9s de un documento OpenXML manipulado que contiene una declaraci\u00f3n de entidad externa en relaci\u00f3n con una referencia a entidad, relacionado con un problema XML External Entity (XXE)." } ], "id": "CVE-2016-5000", "lastModified": "2024-11-21T02:53:24.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-05T14:59:10.143", "references": [ { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/92100" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1037741" }, { "source": "secalert@redhat.com", "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538981/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/list.html?user%40poi.apache.org" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-611" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2024-11-21 02:08
Severity ?
Summary
The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", "versionEndIncluding": "3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1501370-BC00-4456-9A52-EE4E9899567A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "DD7E734A-22C1-4895-AE1F-2EB87126EBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", "matchCriteriaId": "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue." }, { "lang": "es", "value": "La configuraci\u00f3n de OPC SAX en Apache POI anterior a 3.10.1 permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de un fichero OpenXML que contiene una declaraci\u00f3n de entidad externa XML en conjunto con una referencia de entidad, relacionado con un problema de entidad externa XML (XXE)." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e", "id": "CVE-2014-3529", "lastModified": "2024-11-21T02:08:18.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-04T17:55:05.623", "references": [ { "source": "secalert@redhat.com", "url": "http://poi.apache.org/changes.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59943" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60419" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61766" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "secalert@redhat.com", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69647" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/78018" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://poi.apache.org/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/78018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-04 17:55
Modified
2024-11-21 02:08
Severity ?
Summary
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFB8A1B-16AA-46B1-8F87-64256E9EA41F", "versionEndIncluding": "3.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBE2279A-42D7-4FBE-A732-55950225E450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "4B4D079D-DDA3-41D4-9B19-05BBF8E50095", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEDD83D8-2668-4693-A7FB-48F09E1764F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "806A1439-DBB1-4DB0-9D1C-BB9F686C6C99", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AF5C9105-FC01-475F-9D89-6A91FBF2949F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5C858F25-4858-41C6-9BCB-9665D21F265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "C1C3884A-0D34-4256-B2BD-6D7F1A6952EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "6724EEA0-E884-4884-8097-7F833BE58AE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "31C2DDFE-B1B1-42F3-BDE7-09E1DC1F8FDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "81846632-36FF-4149-BCA0-C22B65F220A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F3B9C2F-F10D-4A83-A624-6D6E3E21032A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "75DF4E14-87F4-4AF0-9DF8-E1DA10948255", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "148DF854-533C-48DF-ACF2-13A6A07D03EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B08B2CFF-6357-4830-B5F5-C335B4975E19", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ECEF1F3B-CE2F-4F6B-A78E-38A340092796", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19F54B1C-8894-44F5-AFEC-D0E2863EDB57", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "256470D1-508C-4B0E-B7A3-B2E6357D2372", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "57B95965-17EE-4BCF-BFC1-75FEC936F756", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A135A468-8408-4396-8493-CF62C642F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.7:dev:*:*:*:*:*:*", "matchCriteriaId": "F0FD0D91-0BA7-4CC2-9665-387F4A637FB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.8:dev:*:*:*:*:*:*", "matchCriteriaId": "A2200AC8-A934-45FF-8C38-B4826CEB68E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:1.10:dev:*:*:*:*:*:*", "matchCriteriaId": "9BEC6E7F-81C4-4728-8BE9-CF8D0E35125F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "0395450F-5486-425C-B6BE-549F2CE24C13", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre1:*:*:*:*:*:*", "matchCriteriaId": "EC948D61-A860-4E8E-975D-B19929AD27EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre2:*:*:*:*:*:*", "matchCriteriaId": "1093F797-CF22-4E3D-8F54-3E8F3E7059F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:pre3:*:*:*:*:*:*", "matchCriteriaId": "602F0B28-D553-4F29-BFCB-7F4A409E40F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3202EBFB-B547-4BA2-8219-E00A86995D3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "4466C398-24F7-442F-9327-94E52B73FA7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A7F3423-7636-43DB-8C50-DB83A42D5CFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "05CE5511-6C01-4E19-A351-88B7A944531D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "80482643-A5E8-4585-BAD7-E30B40F2552E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "258A5FF1-C199-4775-9ACC-902D649E751E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "B1F4F15E-0B5E-4DFB-B36C-7470B6454B97", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "22591C38-3610-4910-ABE5-1574446F6650", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4039C-1C2A-478F-8F08-9090DD2CEA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FF35B-4D43-4BB2-8C0D-B8A66CFB58CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta1:*:*:*:*:*:*", "matchCriteriaId": "4855870F-388F-4E72-A4F8-AAE61187A433", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.0.2:beta2:*:*:*:*:*:*", "matchCriteriaId": "BD88A7B3-23BE-411E-9415-B47B5896FFD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19E7943-2097-4C17-B344-948AB45CA308", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta1:*:*:*:*:*:*", "matchCriteriaId": "11E7FCD1-4FE9-4C36-B1A0-745A48999DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.1:beta2:*:*:*:*:*:*", "matchCriteriaId": "45B1D735-DC16-4B1A-A21D-599E7F12651C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC416E22-96C7-4D15-A7C3-6EA2121DCBD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A8F16224-613E-4FC2-A3AB-CD5EB11D4B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta1:*:*:*:*:*:*", "matchCriteriaId": "F0004217-3B76-48B1-97F7-F0E548FBD6D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta2:*:*:*:*:*:*", "matchCriteriaId": "392805F3-3B33-4E20-8108-6ED62DFE7480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta3:*:*:*:*:*:*", "matchCriteriaId": "AE4F139F-2003-453F-9D09-DBD4F2AEE31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta4:*:*:*:*:*:*", "matchCriteriaId": "418B65CF-9DB9-4A84-9872-4C87CC3DA76E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "CB86DA57-CE46-4651-84E1-409F2375A997", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.5:beta6:*:*:*:*:*:*", "matchCriteriaId": "53A87A07-867B-48A9-BC89-47844EF461C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "FA8F24BA-849D-4C37-8094-EF2B6ABE4493", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "6F6C7373-073C-4F4E-859A-4EF82EF6FB72", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta1:*:*:*:*:*:*", "matchCriteriaId": "DC7693A6-11AC-4BF9-9307-49D028F19885", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta2:*:*:*:*:*:*", "matchCriteriaId": "0D435C18-BB4B-4023-8A52-49D44F1A7E9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.7:beta3:*:*:*:*:*:*", "matchCriteriaId": "78A2929E-010F-4C4E-AC2D-3C3AC19B5A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:*:*:*:*:*:*:*", "matchCriteriaId": "F1501370-BC00-4456-9A52-EE4E9899567A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta1:*:*:*:*:*:*", "matchCriteriaId": "B8D5A4F1-6445-45B9-A938-3AF76D3BE56C", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta2:*:*:*:*:*:*", "matchCriteriaId": "6861547D-D84E-4C5C-B85E-D3E1B77DE9FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta3:*:*:*:*:*:*", "matchCriteriaId": "E585E98A-EB9A-492F-8902-85D99AC8E554", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta4:*:*:*:*:*:*", "matchCriteriaId": "8EC5C97D-E6B3-466B-A781-60CA5D2AE9B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.8:beta5:*:*:*:*:*:*", "matchCriteriaId": "258BC823-5828-44B4-AFF5-A7E49281FD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "D6B9F824-EF7C-4708-923F-17EFFCAC1CF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta1:*:*:*:*:*:*", "matchCriteriaId": "DD7E734A-22C1-4895-AE1F-2EB87126EBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.10:beta2:*:*:*:*:*:*", "matchCriteriaId": "5982FCA7-9ACD-49C8-B34B-FFBC2E8D9121", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:poi:3.11:beta1:*:*:*:*:*:*", "matchCriteriaId": "9F89551C-19B6-4731-AB01-831B5B9C8C27", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack." }, { "lang": "es", "value": "Apache POI anterior a 3.10.1 y 3.11.x anterior a 3.11-beta2 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU y ca\u00edda) a trav\u00e9s de un fichero OOXML manipulado, tambi\u00e9n conocido como un ataque de expansi\u00f3n de entidad XML (XEE)." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e", "id": "CVE-2014-3574", "lastModified": "2024-11-21T02:08:25.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-04T17:55:05.670", "references": [ { "source": "secalert@redhat.com", "url": "http://poi.apache.org/changes.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/59943" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60419" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61766" }, { "source": "secalert@redhat.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/69648" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://poi.apache.org/changes.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1370.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1398.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1399.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1400.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/59943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21996759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-24 14:59
Modified
2024-11-21 03:28
Severity ?
Summary
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:poi:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E6BF2C-539C-4F80-A5CE-1B6BB3B08F31", "versionEndIncluding": "3.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack." }, { "lang": "es", "value": "Apache POI en versiones anteriores al lanzamiento 3.15 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un archivo OOXML especialmente manipulado, vulnerabilidad tambi\u00e9n conocida como un ataque de XML Entity Expansion (XEE)." } ], "id": "CVE-2017-5644", "lastModified": "2024-11-21T03:28:05.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-24T14:59:00.273", "references": [ { "source": "security@apache.org", "tags": [ "Vendor Advisory" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" }, { "source": "security@apache.org", "url": "http://www.securityfocus.com/bid/96983" }, { "source": "security@apache.org", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/96983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-776" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }