Vulnerability Details : CVE-2014-3660
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
Vulnerability category: Denial of service
Products affected by CVE-2014-3660
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3660
4.81%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3660
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2014-3660
-
http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
openSUSE-SU-2014:1330-1: moderate: update to fix CVE-2014-3660
-
http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
mandriva.com
-
http://www.openwall.com/lists/oss-security/2014/10/17/7
oss-security - libxml2 issue: billioun laughs variant (CVE-2014-3660)Patch
-
http://www.debian.org/security/2014/dsa-3057
Debian -- Security Information -- DSA-3057-1 libxml2
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView
-
https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
Niet gevonden | Nationaal Cyber Security Centrum
-
http://rhn.redhat.com/errata/RHSA-2014-1655.html
RHSA-2014:1655 - Security Advisory - Red Hat Customer Portal
-
http://www.securityfocus.com/bid/70644
Libxml2 Entities Expansion CVE-2014-3660 Denial of Service Vulnerability
-
https://support.apple.com/kb/HT205031
About the security content of OS X Yosemite v10.10.5 and Security Update 2015-006 - Apple SupportVendor Advisory
-
http://secunia.com/advisories/61991
Sign in
-
http://secunia.com/advisories/61966
Sign in
-
https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
Attachment 944444 Details for Bug 1149084 – Proposed upstream patch
-
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
Oracle Bulletin Board Update - January 2015
-
http://rhn.redhat.com/errata/RHSA-2014-1885.html
RHSA-2014:1885 - Security Advisory - Red Hat Customer Portal
-
http://www.ubuntu.com/usn/USN-2389-1
USN-2389-1: libxml2 vulnerability | Ubuntu security noticesVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
openSUSE-SU-2015:2372-1: moderate: Security update for libxml2
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
Apple - Lists.apple.com
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
Apple - Lists.apple.com
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
https://support.apple.com/kb/HT205030
About the security content of iOS 8.4.1 - Apple SupportVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1149084
1149084 – (CVE-2014-3660) CVE-2014-3660 libxml2: denial of service via recursive entity expansion
-
http://secunia.com/advisories/59903
Sign in
-
http://secunia.com/advisories/61965
Sign in
Jump to