parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-80-1 | libxml2 security update |
![]() |
DLA-151-1 | libxml2 security update |
![]() |
DSA-3057-1 | libxml2 security update |
![]() |
DSA-2978-2 | libxml2 security update |
![]() |
DSA-3057-2 | libxml2 regression update |
![]() |
EUVD-2014-3613 | parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack. |
![]() |
USN-2389-1 | libxml2 vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T10:50:17.928Z
Reserved: 2014-05-14T00:00:00
Link: CVE-2014-3660

No data.

Status : Deferred
Published: 2014-11-04T16:55:06.043
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-3660


No data.