libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
AV:N/AC:L/Au:N/C:N/I:N/A:P
Vendors | Products |
---|---|
Apple |
|
Xmlsoft |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2012-12-21T02:00:00
Updated: 2014-01-23T19:57:01
Reserved: 2012-01-19T00:00:00
Link: CVE-2012-0841
JSON object: View
NVD Information
Status : Modified
Published: 2012-12-21T05:46:14.993
Modified: 2023-02-13T00:23:00.347
Link: CVE-2012-0841
JSON object: View
Redhat Information
No data.
CWE