parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2014-11-04T16:00:00
Updated: 2024-08-06T10:50:17.928Z
Reserved: 2014-05-14T00:00:00
Link: CVE-2014-3660
Vulnrichment
No data.
NVD
Status : Modified
Published: 2014-11-04T16:55:06.043
Modified: 2016-12-08T03:05:40.590
Link: CVE-2014-3660
Redhat