XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream. The attack uses the hash code implementation for collections and maps to force recursive hash calculation causing a stack overflow. This issue is patched in version 1.4.20 which handles the stack overflow and raises an InputManipulationException instead. A potential workaround for users who only use HashMap or HashSet and whose XML refers these only as default map or set, is to change the default implementation of java.util.Map and java.util per the code example in the referenced advisory. However, this implies that your application does not care about the implementation of the map and all elements are comparable.
Published 2022-12-28 00:15:14
Updated 2023-06-27 14:04:14
Source GitHub, Inc.
View at NVD,   CVE.org
Vulnerability category: OverflowDenial of service

Products affected by CVE-2022-41966

Exploit prediction scoring system (EPSS) score for CVE-2022-41966

0.80%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2022-41966

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.9
3.6
NIST
8.2
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
3.9
4.2
GitHub, Inc.
7.5
HIGH AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
N/A
N/A
Oracle:CPUOct2023

CWE ids for CVE-2022-41966

  • The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
    Assigned by: security-advisories@github.com (Secondary)
  • A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
    Assigned by: security-advisories@github.com (Secondary)
  • The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
    Assigned by: security-advisories@github.com (Secondary)
  • The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2022-41966

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!