CVE-2011-1753
Published Jun 21, 2011
Last updated 7 years ago
Overview
- Description
- expat_erl.c in ejabberd before 2.1.7 and 3.x before 3.0.0-alpha-3, and exmpp before 0.9.7, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD5B8BF6-DAEA-4557-A6D8-8F7BCB893FEB", "versionEndIncluding": "2.1.6" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "666E7908-0690-4DFE-8141-07F2D15E5404" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDFFF6D6-C749-4D07-85A5-E6D343FC4243" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6EE1B8F-0FDB-4E00-A15A-C107DCDB93BB" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18E7EDE8-298E-444E-A624-0202705C516C" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C81B5565-94A8-4F03-A846-3C3F842B909D" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC959279-43D7-4CB0-A845-25D4DE92E06A" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46528149-3D63-4E68-9209-DAFA55B3A855" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6D5B249-4D6D-4B15-9348-2C7C0A0B82E6" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2425925-5ACB-4BE4-9C98-F028647AAF2F" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB7AF867-ED0A-428A-A53D-E20B733EBAF0" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4409695C-2A6C-4D27-9DB9-D0BD653487E4" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F78A11B2-2110-4372-8579-DDA24691C18A" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "906C248B-FFD7-4EF0-A181-BACE05B324AD" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36B7CC0A-CD37-4E31-9A99-41E59EB46E36" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.1_2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F401CBE2-80FC-4D64-A21B-5966330E9C08" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B0CBC37-5A98-4067-93FF-6B637F9C7EDC" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE7C5587-2FB0-4D05-ABB0-0C566964971D" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00AB30D9-688A-4F14-BEAF-7B3FBAF719C3" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AC9F432-B650-4AAC-86B5-5C5A037057E8" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25B4CDF3-43DC-4F5B-B8BC-76E08C5B8C67" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50123C8E-2164-4239-A2DB-8CF60459EBF1" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13040FDA-1672-480D-9153-41B3A51CCB22" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93F73ED8-575E-41F3-AC36-198B627F30AF" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96BF9CB2-C033-42D9-B976-E1A7797FA417" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5AACC08-E1FD-4282-B051-4539D69CAF57" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:3.0.0:alpha1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60A26956-C0CE-4265-9C0E-DE1ED1FDE22B" }, { "criteria": "cpe:2.3:a:process-one:ejabberd:3.0.0:alpha2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7262BB2A-C7F3-4FAA-A66E-2DC1ADCD5E86" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:process-one:exmpp:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F0CC56A-3014-4B8E-AA51-21E2969005C2", "versionEndIncluding": "0.9.6" }, { "criteria": "cpe:2.3:a:process-one:exmpp:0.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5AE0A58-1128-43E4-8DAD-A0775A6BF74C" }, { "criteria": "cpe:2.3:a:process-one:exmpp:0.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BE09DF7-A37F-45A0-99C7-CCC7B259FB55" }, { "criteria": "cpe:2.3:a:process-one:exmpp:0.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82714670-785A-4FE2-A452-12784E0CF0F4" }, { "criteria": "cpe:2.3:a:process-one:exmpp:0.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2E43DCD-6969-4D43-B79E-5BB87975D0D4" }, { "criteria": "cpe:2.3:a:process-one:exmpp:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2583566-65AE-459D-8B88-85C8B4071A3F" } ], "operator": "OR" } ] } ]