We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47072

XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream



Description

XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

Reserved 2024-09-17 | Published 2024-11-07 | Updated 2024-11-08 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-121: Stack-based Buffer Overflow

CWE-502: Deserialization of Untrusted Data

Product status

< 1.4.21
affected

References

github.com/...stream/security/advisories/GHSA-hfq9-hggm-c56q

github.com/...ommit/bb838ce2269cac47433e31c77b2b236466e9f266

x-stream.github.io/CVE-2024-47072.html

cve.org (CVE-2024-47072)

nvd.nist.gov (CVE-2024-47072)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47072

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.