CVE-2011-1753
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
21/06/2011
Last modified:
11/04/2025
Description
expat_erl.c in ejabberd before 2.1.7 and 3.x before 3.0.0-alpha-3, and exmpp before 0.9.7, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:* | 2.1.6 (including) | |
cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062099.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062145.html
- http://secunia.com/advisories/44765
- http://secunia.com/advisories/44807
- http://secunia.com/advisories/45120
- http://www.debian.org/security/2011/dsa-2248
- http://www.ejabberd.im/ejabberd-2.1.7
- http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.7/
- http://www.securityfocus.com/bid/48072
- https://bugzilla.redhat.com/show_bug.cgi?id=700454
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67769
- https://git.process-one.net/ejabberd/mainline/commit/bd1df027c622e1f96f9eeaac612a6a956c1ff0b6
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062099.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062145.html
- http://secunia.com/advisories/44765
- http://secunia.com/advisories/44807
- http://secunia.com/advisories/45120
- http://www.debian.org/security/2011/dsa-2248
- http://www.ejabberd.im/ejabberd-2.1.7
- http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.7/
- http://www.securityfocus.com/bid/48072
- https://bugzilla.redhat.com/show_bug.cgi?id=700454
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67769
- https://git.process-one.net/ejabberd/mainline/commit/bd1df027c622e1f96f9eeaac612a6a956c1ff0b6