parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2014-11-04T16:00:00
Updated: 2016-12-06T18:57:01
Reserved: 2014-05-14T00:00:00
Link: CVE-2014-3660
JSON object: View
NVD Information
Status : Modified
Published: 2014-11-04T16:55:06.043
Modified: 2016-12-08T03:05:40.590
Link: CVE-2014-3660
JSON object: View
Redhat Information
No data.
CWE