Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Link | Tags |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21996759 | |
http://www.securityfocus.com/bid/69648 | vdb entry |
http://poi.apache.org/changes.html | |
http://secunia.com/advisories/61766 | third party advisory |
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations | patch vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-1370.html | vendor advisory |
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt | vendor advisory |
http://secunia.com/advisories/60419 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/95768 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2014-1400.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2014-1398.html | vendor advisory |
http://secunia.com/advisories/59943 | third party advisory |
http://rhn.redhat.com/errata/RHSA-2014-1399.html | vendor advisory |