There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | Infinite loop within Apache XercesJ xml parser |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
Apache XercesJ users, should migrate to version 2.12.2
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl | x_transferred |
| http://www.openwall.com/lists/oss-security/2022/01/24/3 | mailing-list x_transferred |
| https://www.oracle.com/security-alerts/cpuapr2022.html | x_transferred |
| https://www.oracle.com/security-alerts/cpujul2022.html | x_transferred |
| https://security.netapp.com/advisory/ntap-20221028-0005/ | x_transferred |
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 3.1 | 6.5 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
| Primary | 2.0 | 7.1 | HIGH | AV:N/AC:M/Au:N/C:N/I:N/A:C |
| Hyperlink | Source | Resource |
|---|---|---|
| http://www.openwall.com/lists/oss-security/2022/01/24/3 | security@apache.org | Mailing List Third Party Advisory |
| https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl | security@apache.org | Mailing List Vendor Advisory |
| https://security.netapp.com/advisory/ntap-20221028-0005/ | security@apache.org | Third Party Advisory |
| https://www.oracle.com/security-alerts/cpuapr2022.html | security@apache.org | Patch Third Party Advisory |
| https://www.oracle.com/security-alerts/cpujul2022.html | security@apache.org | Patch Third Party Advisory |