MGASA-2014-0550

Source
https://advisories.mageia.org/MGASA-2014-0550.html
Import Source
https://advisories.mageia.org/MGASA-2014-0550.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0550
Related
Published
2014-12-26T17:04:58Z
Modified
2014-12-26T16:56:29Z
Summary
Updated apache-poi packages fix security vulnerabilities
Details

Updated apache-poi packages fix security vulnerabilities:

It was found that Apache POI would resolve entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks (CVE-2014-3529).

It was found that Apache POI would expand an unlimited number of entities in OOXML documents. A remote attacker able to supply OOXML documents that are parsed by Apache POI could use this flaw to trigger a denial of service attack via excessive CPU and memory consumption (CVE-2014-3574).

References
Credits

Affected packages

Mageia:4 / apache-poi

Package

Name
apache-poi
Purl
pkg:rpm/mageia/apache-poi?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.10.1-1.mga4

Ecosystem specific

{
    "section": "core"
}