Vulnerability Details : CVE-2015-3192
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
Vulnerability category: Denial of service
Products affected by CVE-2015-3192
- cpe:2.3:a:vmware:spring_framework:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:3.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:spring_framework:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:spring_framework:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:pivotal_software:spring_framework:4.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3192
0.87%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3192
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2015-3192
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3192
-
https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html
[SECURITY] [DLA 1853-1] libspring-java security update
-
https://access.redhat.com/errata/RHSA-2016:1219
RHSA-2016:1219 - Security Advisory - Red Hat Customer Portal
-
https://jira.spring.io/browse/SPR-13136
XML input vulnerability based on DTD declaration [SPR-13136] · Issue #17727 · spring-projects/spring-framework · GitHub
-
http://rhn.redhat.com/errata/RHSA-2016-2035.html
RHSA-2016:2035 - Security Advisory - Red Hat Customer Portal
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162017.html
[SECURITY] Fedora 22 Update: springframework-3.2.14-1.fc22
-
http://rhn.redhat.com/errata/RHSA-2016-1592.html
RHSA-2016:1592 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-2036.html
RHSA-2016:2036 - Security Advisory - Red Hat Customer Portal
-
http://www.securitytracker.com/id/1036587
Red Hat JBoss XML Parsing Flaw Lets Remote Users Deny Service - SecurityTracker
-
http://pivotal.io/security/cve-2015-3192
CVE-2015-3192 DoS Attack with XML Input | Security | PivotalVendor Advisory
-
http://www.securityfocus.com/bid/90853
Spring Framework CVE-2015-3192 Denial-Of-Service Vulnerability
-
https://access.redhat.com/errata/RHSA-2016:1218
RHSA-2016:1218 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-1593.html
RHSA-2016:1593 - Security Advisory - Red Hat Customer Portal
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162015.html
[SECURITY] Fedora 21 Update: springframework-3.2.14-1.fc21
Jump to