parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2-dbg" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2-dev" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2-doc" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2-udeb" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2-utils" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "libxml2-utils-dbg" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "python-libxml2" }, { "binary_version": "2.9.1+dfsg1-3ubuntu4.4", "binary_name": "python-libxml2-dbg" } ] }