Vulnerabilites related to apache - xerces2_java
Vulnerability from fkie_nvd
Published
2013-07-23 11:03
Modified
2025-04-11 00:51
Severity ?
Summary
XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
References
psirt@us.ibm.comhttp://lists.apple.com/archives/security-announce/2013/Oct/msg00001.htmlBroken Link, Mailing List
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.htmlThird Party Advisory
psirt@us.ibm.comhttp://lists.opensuse.org/opensuse-updates/2013-11/msg00023.htmlThird Party Advisory
psirt@us.ibm.comhttp://marc.info/?l=bugtraq&m=138674031212883&w=2Issue Tracking, Mailing List, Third Party Advisory
psirt@us.ibm.comhttp://marc.info/?l=bugtraq&m=138674073720143&w=2Issue Tracking, Mailing List, Third Party Advisory
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1059.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1060.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1081.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1440.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1447.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1451.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2013-1505.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2014-1818.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2014-1821.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2014-1822.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2014-1823.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-0675.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-0720.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-0765.htmlBroken Link
psirt@us.ibm.comhttp://rhn.redhat.com/errata/RHSA-2015-0773.htmlBroken Link
psirt@us.ibm.comhttp://secunia.com/advisories/56257Third Party Advisory
psirt@us.ibm.comhttp://security.gentoo.org/glsa/glsa-201406-32.xmlThird Party Advisory
psirt@us.ibm.comhttp://support.apple.com/kb/HT5982Third Party Advisory
psirt@us.ibm.comhttp://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patchPatch, Vendor Advisory
psirt@us.ibm.comhttp://www-01.ibm.com/support/docview.wss?uid=swg1IC98015Vendor Advisory
psirt@us.ibm.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21644197Vendor Advisory
psirt@us.ibm.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21653371Vendor Advisory
psirt@us.ibm.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21657539Vendor Advisory
psirt@us.ibm.comhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.htmlThird Party Advisory
psirt@us.ibm.comhttp://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013Vendor Advisory
psirt@us.ibm.comhttp://www.ibm.com/support/docview.wss?uid=swg21648172Broken Link
psirt@us.ibm.comhttp://www.securityfocus.com/bid/61310Third Party Advisory, VDB Entry
psirt@us.ibm.comhttp://www.ubuntu.com/usn/USN-2033-1Third Party Advisory
psirt@us.ibm.comhttp://www.ubuntu.com/usn/USN-2089-1Third Party Advisory
psirt@us.ibm.comhttps://access.redhat.com/errata/RHSA-2014:0414Third Party Advisory
psirt@us.ibm.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/85260VDB Entry, Vendor Advisory
psirt@us.ibm.comhttps://issues.apache.org/jira/browse/XERCESJ-1679Issue Tracking, Vendor Advisory
psirt@us.ibm.comhttps://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
psirt@us.ibm.comhttps://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
psirt@us.ibm.comhttps://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
psirt@us.ibm.comhttps://www.oracle.com/security-alerts/cpuapr2022.html
psirt@us.ibm.comhttps://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.htmlBroken Link, Mailing List
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=138674031212883&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=138674073720143&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1059.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1060.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1081.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1440.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1447.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1451.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1505.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1818.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1821.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1822.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-1823.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0675.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0720.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0765.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0773.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56257Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201406-32.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5982Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21644197Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21653371Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21657539Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=swg21648172Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/61310Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2033-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2089-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2014:0414Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/85260VDB Entry, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://issues.apache.org/jira/browse/XERCESJ-1679Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2022.html
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.htmlThird Party Advisory
Impacted products
Vendor Product Version
ibm java 5.0.0.0
ibm java 5.0.11.0
ibm java 5.0.11.1
ibm java 5.0.11.2
ibm java 5.0.12.0
ibm java 5.0.12.1
ibm java 5.0.12.2
ibm java 5.0.12.3
ibm java 5.0.12.4
ibm java 5.0.12.5
ibm java 5.0.13.0
ibm java 5.0.14.0
ibm java 5.0.15.0
ibm java 5.0.16.0
ibm java 5.0.16.1
ibm java 5.0.16.2
ibm java 6.0.0.0
ibm java 6.0.1.0
ibm java 6.0.2.0
ibm java 6.0.3.0
ibm java 6.0.4.0
ibm java 6.0.5.0
ibm java 6.0.6.0
ibm java 6.0.7.0
ibm java 6.0.8.0
ibm java 6.0.8.1
ibm java 6.0.9.0
ibm java 6.0.9.1
ibm java 6.0.9.2
ibm java 6.0.10.0
ibm java 6.0.10.1
ibm java 6.0.11.0
ibm java 6.0.12.0
ibm java 6.0.13.0
ibm java 6.0.13.1
ibm java 6.0.13.2
ibm java 7.0.0.0
ibm java 7.0.1.0
ibm java 7.0.2.0
ibm java 7.0.3.0
ibm java 7.0.4.0
ibm java 7.0.4.1
ibm java 7.0.4.2
oracle jdk 1.5.0
oracle jdk 1.6.0
oracle jdk 1.7.0
oracle jre 1.5.0
oracle jre 1.6.0
oracle jre 1.7.0
oracle jrockit *
oracle jrockit *
ibm sterling_b2b_integrator 5.2.4
ibm host_on-demand 11.0
ibm host_on-demand 11.0.1
ibm host_on-demand 11.0.2
ibm host_on-demand 11.0.3
ibm host_on-demand 11.0.4
ibm host_on-demand 11.0.5
ibm host_on-demand 11.0.5.1
ibm host_on-demand 11.0.6
ibm host_on-demand 11.0.6.1
ibm host_on-demand 11.0.7
ibm host_on-demand 11.0.8
microsoft windows -
ibm tivoli_application_dependency_discovery_manager 7.2.2
ibm aix -
linux linux_kernel -
microsoft windows -
oracle solaris -
ibm sterling_b2b_integrator 5.1
ibm sterling_b2b_integrator 5.2
ibm sterling_file_gateway 2.1
ibm sterling_file_gateway 2.2
hp hp-ux -
ibm aix -
ibm i -
linux linux_kernel -
microsoft windows -
oracle solaris -
opensuse opensuse 12.2
opensuse opensuse 12.3
suse linux_enterprise_desktop 10
suse linux_enterprise_desktop 11
suse linux_enterprise_java 10
suse linux_enterprise_java 11
suse linux_enterprise_java 11
suse linux_enterprise_sdk 11
suse linux_enterprise_sdk 11
suse linux_enterprise_server 9
suse linux_enterprise_server 10
suse linux_enterprise_server 10
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 11
suse linux_enterprise_server 11
canonical ubuntu_linux 10.04
canonical ubuntu_linux 12.04
canonical ubuntu_linux 12.10
canonical ubuntu_linux 13.04
canonical ubuntu_linux 13.10
apache xerces2_java *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D3F84F-3F6E-4DF1-B162-152293D951EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A18121C3-F3F1-4EC7-A64E-3F6A0C9788C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAD59912-7325-4AE1-ACCF-D4F804AF3947",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "62783157-E3B6-4A23-8D2F-1FBD0762E9A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "14CC0D53-8AB8-4D44-82BB-0E6A974C36AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "91A3129F-17A6-4F32-BD5D-34E4A1D1A840",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2845FF4-2620-4B8D-96CF-CC26B3DEA3C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7CD279-54B6-4F6B-AE14-299FB319C690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EA269CA-4676-4008-89EF-20FAB89886A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D22105B6-1378-4E1C-B28A-FCAE00A2D5CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "601762D3-1188-4945-931D-EB8DAC2847A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA4A30A6-498C-46B8-8EFC-45EB13354EAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "414CC00A-C797-4C34-8709-75DC061DCDE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4401B967-0550-44F1-8753-9632120D2A44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4961693D-F56C-46CD-B721-6A15E2837C17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA4FBB66-CF6A-42D2-B122-1861F4139E75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "14AD4A87-382A-41F0-96D8-0F0A9B738773",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33701DDF-6882-41D3-A11B-A1F4585A77A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "25C58BBA-06AC-40CD-A906-FD1B3B0AAB69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C5B430-EE11-4674-B4B0-895D66E3B32F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1837D84-6B4F-40D8-9A3F-71C328F659BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D20A369B-2168-4883-A84C-BB48A71AFB33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3628AAB4-E524-46E5-AAF4-1980256F13CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "30DC9FE3-CDE9-4F83-989B-4E431BA18B56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C17B1C6B-04CE-49FB-B9BD-98ECD626B26F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "81F529EB-2BCA-4E3E-93E4-2A9880CDA367",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DEAC3D6-F9F8-4F82-9BF1-FF0EC07A3274",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7694638C-CDAC-44DF-B9F9-F7237CD98017",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "23903A3C-1760-4836-BAE6-BDD32CBB4CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2477E033-D26B-4D71-839B-5FE4B0927559",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CAB7BF-265E-411D-A584-E78DE171F065",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E45F670-232F-4CE5-8926-6463E5619506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B70E6E3-15B3-4D48-AE49-B9184A58EECE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5BCE3FD-B89B-4141-8103-9DB941AD60D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EADFB3B-738F-4919-B165-9ECEED46EA6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B23A5431-E599-4848-AB83-B299898F5EF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A8BF650-B8F5-467E-8DBF-81788B55F345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1752A831-916F-4A7D-8AAE-1CEFACC51F91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C9744C4-76BE-428B-AFF2-5BCE00A58322",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "48B1DE45-90F9-416B-9087-8AEF5B0A3C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EF6A045-0DF6-463B-A0DB-6C31D8C2984C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A731493C-9B46-4105-9902-B15BA0E0FB11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "49454369-A494-4EAA-88D5-181570DEBB4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
                     matchCriteriaId: "04C71221-E477-4DF8-B10A-3AC64511E4EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
                     matchCriteriaId: "FF7DE0E6-F329-417B-8035-B4EBF9C97483",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
                     matchCriteriaId: "220536FA-695D-4DE8-9813-494E3D061B78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
                     matchCriteriaId: "ACB55CC5-0EC7-44B2-B5A9-A5B1EE584791",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
                     matchCriteriaId: "4F6B5E73-6751-475A-B9BF-3414D3476208",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
                     matchCriteriaId: "7CB654DC-1D3D-4475-8815-335AC573F54C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF26274E-5364-4FC1-9603-A78C365596DB",
                     versionEndIncluding: "r27.7.6",
                     versionStartIncluding: "r27.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "583E7A18-48C5-4AEE-A9C1-239D678E275A",
                     versionEndIncluding: "r28.2.8",
                     versionStartIncluding: "r28.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF65201D-8980-450A-A542-3B5473A6F374",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E51D5AEF-B3D4-4782-9988-BC1DB3F3F296",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E179FC2F-C700-4998-9D7A-3B945874CAC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2341D5E7-15CD-4C8F-ABE8-AA915BFA2804",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "474DC3BA-27F2-452A-85AD-BCC476EDD35B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "997CA07C-EBB7-4D7F-AF23-A161817BF4A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BFE87FC-7B77-4840-8185-1707CB37323B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C77DD8B3-A227-4350-8699-FEC822119393",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA56704-18EB-4F3B-A36F-BCEF67B07C0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "420CC5FF-0300-4FA7-AB53-78C1A0B83C11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7132A0E-C2A1-403E-9516-A6911563D7B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F32CA797-ED68-426E-9370-E16C90075E01",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2F6EF3-721A-43AB-AAFD-BE3EEDB0AA61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E492C463-D76E-49B7-A4D4-3B499E422D89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
                     matchCriteriaId: "F5027746-8216-452D-83C5-2F8E9546F2A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "40363692-5283-4D0C-BAE1-C049C02A0294",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F805BA3A-178D-416E-9DED-4258F71A17C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A40AC14-AC2B-4A0D-A9CC-3A00B48D8975",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1554D69E-D68E-46CA-B1F7-C24CAABF58E8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F480AA32-841A-4E68-9343-B2E7548B0A0C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E492C463-D76E-49B7-A4D4-3B499E422D89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C684FC45-C9BA-4EF0-BD06-BB289450DD21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
                     matchCriteriaId: "F5027746-8216-452D-83C5-2F8E9546F2A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D806A17E-B8F9-466D-807D-3F1E77603DC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
                     matchCriteriaId: "4339DE06-19FB-4B8E-B6AE-3495F605AD05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "3ED68ADD-BBDA-4485-BC76-58F011D72311",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
                     matchCriteriaId: "3CF5C5B9-2CB9-4CD8-B94F-A674ED909CC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "252CF7A7-3FEB-4503-AEE8-B67139C5B0D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "79D7DBBA-6849-45F7-AFEF-C765569C481A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "2C634990-2690-4E3B-B21F-6687A6A34644",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*",
                     matchCriteriaId: "73B7BC23-6CCA-41B2-8F61-EDB95F1AFB1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD2D897-E321-4CED-92E0-11A98B52053C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
                     matchCriteriaId: "CED02712-1031-4206-AC4D-E68710F46EC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
                     matchCriteriaId: "D1D7B467-58DD-45F1-9F1F-632620DF072A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
                     matchCriteriaId: "88D6E858-FD8F-4C55-B7D5-CEEDA2BBA898",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
                     matchCriteriaId: "DB4D6749-81A1-41D7-BF4F-1C45A7F49A22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                     matchCriteriaId: "E534C201-BCC5-473C-AAA7-AAB97CEB5437",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                     matchCriteriaId: "2470C6E8-2024-4CF5-9982-CFF50E88EAE9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                     matchCriteriaId: "01EDA41C-6B2E-49AF-B503-EB3882265C11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                     matchCriteriaId: "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2076871-2E80-4605-A470-A41C1A8EC7EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61F047-129C-41A6-8A27-FFCBB8563E91",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CFD62E4-794A-43C0-8C65-A44D970D1569",
                     versionEndExcluding: "2.12.0",
                     versionStartIncluding: "2.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.",
      },
      {
         lang: "es",
         value: "XMLscanner.java en Apache Xerces2 Java Parser, en versiones anteriores a la 2.12.0, tal y como se empleó en Java Runtime Environment (JRE) en IBM Java, en versiones 5.0 anteriores a la 5.0 SR16-FP3, 6 anteriores a la 6 SR14, 6.0.1 anteriores a la 6.0.1 SR6 y 7 anteriores a la 7 SR5, así como en Oracle Java SE 7u40 y anteriores, Java SE 6u60 y anteriores, Java SE 5.0u51 y anteriores, JRockit R28.2.8 y anteriores, JRockit R27.7.6 y anteriores, Java SE Embedded 7u40 y anteriores y, posiblemente, otros productos, permite que los atacantes remotos realicen una denegación de servicio (DoS) mediante vectores relacionados con los nombres de atributo XML.",
      },
   ],
   id: "CVE-2013-4002",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-07-23T11:03:19.790",
   references: [
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/56257",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-201406-32.xml",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.apple.com/kb/HT5982",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.ibm.com/support/docview.wss?uid=swg21648172",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/61310",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2033-1",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2089-1",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2014:0414",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://issues.apache.org/jira/browse/XERCESJ-1679",
      },
      {
         source: "psirt@us.ibm.com",
         url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
      },
      {
         source: "psirt@us.ibm.com",
         url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "psirt@us.ibm.com",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "psirt@us.ibm.com",
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "psirt@us.ibm.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/56257",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-201406-32.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.apple.com/kb/HT5982",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.ibm.com/support/docview.wss?uid=swg21648172",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/61310",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2033-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-2089-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2014:0414",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "VDB Entry",
            "Vendor Advisory",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://issues.apache.org/jira/browse/XERCESJ-1679",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
      },
   ],
   sourceIdentifier: "psirt@us.ibm.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2009-08-06 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
References
cret@cert.orghttp://lists.apple.com/archives/security-announce/2009/Sep/msg00000.htmlMailing List, Third Party Advisory
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.htmlThird Party Advisory
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlThird Party Advisory
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.htmlThird Party Advisory
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.htmlThird Party Advisory
cret@cert.orghttp://marc.info/?l=bugtraq&m=125787273209737&w=2Mailing List, Third Party Advisory
cret@cert.orghttp://marc.info/?l=bugtraq&m=125787273209737&w=2Mailing List, Third Party Advisory
cret@cert.orghttp://rhn.redhat.com/errata/RHSA-2012-1232.htmlBroken Link
cret@cert.orghttp://rhn.redhat.com/errata/RHSA-2012-1537.htmlBroken Link
cret@cert.orghttp://secunia.com/advisories/36162Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/36176Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/36180Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/36199Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/37300Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/37460Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/37671Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/37754Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/38231Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/38342Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/43300Third Party Advisory
cret@cert.orghttp://secunia.com/advisories/50549Third Party Advisory
cret@cert.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026Third Party Advisory
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1Broken Link, Patch
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1Broken Link, Patch, Vendor Advisory
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1Broken Link
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1Broken Link
cret@cert.orghttp://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=hPatch, Vendor Advisory
cret@cert.orghttp://www.cert.fi/en/reports/2009/vulnerability2009085.htmlThird Party Advisory
cret@cert.orghttp://www.codenomicon.com/labs/xml/Third Party Advisory
cret@cert.orghttp://www.debian.org/security/2010/dsa-1984Third Party Advisory
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:209Third Party Advisory
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:108Third Party Advisory
cret@cert.orghttp://www.networkworld.com/columnists/2009/080509-xml-flaw.htmlThird Party Advisory
cret@cert.orghttp://www.openwall.com/lists/oss-security/2009/09/06/1Mailing List, Third Party Advisory
cret@cert.orghttp://www.openwall.com/lists/oss-security/2009/10/22/9Mailing List, Patch, Third Party Advisory
cret@cert.orghttp://www.openwall.com/lists/oss-security/2009/10/23/6Mailing List, Third Party Advisory
cret@cert.orghttp://www.openwall.com/lists/oss-security/2009/10/26/3Mailing List, Third Party Advisory
cret@cert.orghttp://www.oracle.com/technetwork/topics/security/cpujan2010-084891.htmlThird Party Advisory
cret@cert.orghttp://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.htmlBroken Link
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2009-1615.htmlThird Party Advisory
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2011-0858.htmlThird Party Advisory
cret@cert.orghttp://www.securityfocus.com/archive/1/507985/100/0/threadedThird Party Advisory, VDB Entry
cret@cert.orghttp://www.securityfocus.com/bid/35958Third Party Advisory, VDB Entry
cret@cert.orghttp://www.securitytracker.com/id?1022680Third Party Advisory, VDB Entry
cret@cert.orghttp://www.ubuntu.com/usn/USN-890-1Third Party Advisory
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA09-294A.htmlThird Party Advisory, US Government Resource
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA10-012A.htmlThird Party Advisory, US Government Resource
cret@cert.orghttp://www.vmware.com/security/advisories/VMSA-2009-0016.htmlThird Party Advisory
cret@cert.orghttp://www.vupen.com/english/advisories/2009/2543Permissions Required
cret@cert.orghttp://www.vupen.com/english/advisories/2009/3316Permissions Required
cret@cert.orghttp://www.vupen.com/english/advisories/2011/0359Permissions Required
cret@cert.orghttps://bugzilla.redhat.com/show_bug.cgi?id=512921Issue Tracking, Third Party Advisory
cret@cert.orghttps://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520Third Party Advisory
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356Third Party Advisory
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1199.htmlBroken Link
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1200.htmlBroken Link
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1201.htmlBroken Link
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1636.htmlBroken Link
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1637.htmlBroken Link
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1649.htmlBroken Link
cret@cert.orghttps://rhn.redhat.com/errata/RHSA-2009-1650.htmlBroken Link
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.htmlMailing List, Third Party Advisory
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=125787273209737&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=125787273209737&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1232.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1537.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36162Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36176Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36180Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36199Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37300Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37460Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37671Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37754Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38231Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38342Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43300Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50549Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1Broken Link, Patch
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1Broken Link, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=hPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cert.fi/en/reports/2009/vulnerability2009085.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.codenomicon.com/labs/xml/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-1984Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:209Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:108Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.networkworld.com/columnists/2009/080509-xml-flaw.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/09/06/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/10/22/9Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/10/23/6Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/10/26/3Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2009-1615.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0858.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507985/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35958Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022680Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-890-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA09-294A.htmlThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA10-012A.htmlThird Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2543Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3316Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0359Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=512921Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1199.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1200.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1201.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1636.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1637.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1649.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2009-1650.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.htmlMailing List, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "711BCDB5-83BC-4DBA-8097-2CD33617FD19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*",
                     matchCriteriaId: "B5F20B3E-781F-4DC1-B939-B0EAFC515F71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*",
                     matchCriteriaId: "BEB37E93-38EB-4AEE-A3DD-D2097C0D6852",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*",
                     matchCriteriaId: "59DED85A-153E-40B1-9ABA-D405204E464E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*",
                     matchCriteriaId: "168E67FC-32BC-4DAE-B49C-840FD721D7AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*",
                     matchCriteriaId: "83A2B4A2-ED27-4C12-871B-C0F78C3478FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A5D2D-B620-449B-B599-51F5C9FC658C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*",
                     matchCriteriaId: "9A39B469-5041-4715-B6AC-36D8777677EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*",
                     matchCriteriaId: "F49DBD1F-D3F5-400B-AE2E-BC87B05A5051",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*",
                     matchCriteriaId: "8E605982-97A2-4E5E-847E-2BB8AD77910C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*",
                     matchCriteriaId: "848299EC-DE52-4511-BF53-C83022935964",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*",
                     matchCriteriaId: "CD5BD598-ADBC-42EE-BF81-049D89CCA426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*",
                     matchCriteriaId: "64AC19E5-A20C-4D51-B465-ABCDBADF550A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*",
                     matchCriteriaId: "A2CCCA1A-F0A1-4511-AF84-326DF406C0DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*",
                     matchCriteriaId: "81B0BEF9-25FD-48F7-83BC-BEA31BC3A1BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*",
                     matchCriteriaId: "4E6D8590-0A99-43E0-9256-9572112F9C8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*",
                     matchCriteriaId: "5F2A0870-A4D3-481B-8A37-A4DC282B0DE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*",
                     matchCriteriaId: "20171515-B5A5-44D2-B7F7-21EDDE39989E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*",
                     matchCriteriaId: "F734AF76-4CEE-4F9D-AD6A-6BECF1F977CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*",
                     matchCriteriaId: "985B45F6-C285-4061-A656-A4C1A1FE59D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "4A420DA5-1346-446B-8D23-E1E6DDBE527E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*",
                     matchCriteriaId: "B8CA8719-7ABE-4279-B49E-C414794A4FE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*",
                     matchCriteriaId: "DC92B7EC-849F-4255-9D55-43681B8DADC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*",
                     matchCriteriaId: "2ABC1045-7D3D-4A14-B994-7E60A4BB4C9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*",
                     matchCriteriaId: "1F3C1E65-929A-4468-8584-F086E6E59839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*",
                     matchCriteriaId: "42C95C1D-0C2E-4733-AB1B-65650D88995D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*",
                     matchCriteriaId: "47A9F499-D1E3-41BD-AC18-E8D3D3231C12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*",
                     matchCriteriaId: "D6E07069-D6EE-4D44-94A6-CDCA4A50E6F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*",
                     matchCriteriaId: "344FA3EA-9E25-493C-976A-211D1404B251",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*",
                     matchCriteriaId: "D081A380-5AA4-4451-94A9-7B65810106E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*",
                     matchCriteriaId: "112E7575-A3A0-4A94-AD39-7B2325B150B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*",
                     matchCriteriaId: "708E8CEF-82EE-4D4B-ABF9-87AA4878F517",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*",
                     matchCriteriaId: "D5D9D9A7-8819-44A4-80AC-52D6B63A0C9B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*",
                     matchCriteriaId: "7000D33B-F3C7-43E8-8FC7-9B97AADC3E12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3BB5EDB-520B-4DEF-B06E-65CA13152824",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B42AB65-443B-4655-BAEA-4EB4A43D9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD2D897-E321-4CED-92E0-11A98B52053C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*",
                     matchCriteriaId: "22A79A35-05DB-4B9F-AD3E-EA6F933CF10C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
                     matchCriteriaId: "79A35457-EAA3-4BF9-A4DA-B2E414A75A02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
                     matchCriteriaId: "F13F07CC-739B-465C-9184-0E9D708BD4C7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C757774-08E7-40AA-B532-6F705C8F7639",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
                     matchCriteriaId: "7EBFE35C-E243-43D1-883D-4398D71763CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4747CC68-FAF4-482F-929A-9DA6C24CB663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F920C50-FE0F-4915-965A-AA58884DF7A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "944FDBF2-1262-4B85-A7D3-537330144D22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "57C2F58F-13AA-45C5-9172-8465B44CA9FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_web_services:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A3115EB-0671-4E0C-9B75-FACFD6D42B88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_web_services:7.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "F3376F25-51D0-4D84-AFC7-AD1C1BCA0191",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:primavera_web_services:7.0:sp1:*:*:*:*:*:*",
                     matchCriteriaId: "BDE00C3E-BB4E-4E71-86B8-E637BCD033A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:xerces2_java:2.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC3C1085-3255-449C-AFE3-984EFAC5BCCE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
      },
      {
         lang: "es",
         value: "Apache Xerces2 Java, tal como se utiliza en Sun Java Runtime Environment (JRE) en JDK y JRE v6 anterior a la actualización 15 y el JDK y JRE v5.0 antes de la actualización 20, y en otros productos, permite a atacantes remotos provocar una denegación de servicio (bucle infinito y la cuelgue de aplicación) a través de una entrada XML malformada, como lo demuestra Codenomicon XML fuzzing framework.",
      },
   ],
   id: "CVE-2009-2625",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2009-08-06T15:30:00.327",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2012-1537.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36162",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36176",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36180",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36199",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37300",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37460",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37671",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37754",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/38231",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/38342",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/43300",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/50549",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
            "Patch",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.codenomicon.com/labs/xml/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2010/dsa-1984",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/09/06/1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/10/22/9",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/10/23/6",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/10/26/3",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2009-1615.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2011-0858.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/35958",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id?1022680",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-890-1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA10-012A.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2009/2543",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2009/3316",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0359",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=512921",
      },
      {
         source: "cret@cert.org",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1199.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2012-1537.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36162",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36176",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36180",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/36199",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37460",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37671",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/37754",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/38231",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/38342",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/43300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://secunia.com/advisories/50549",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Patch",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.codenomicon.com/labs/xml/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2010/dsa-1984",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/09/06/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/10/22/9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/10/23/6",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2009/10/26/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2009-1615.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2011-0858.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/35958",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id?1022680",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/USN-890-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA10-012A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2009/2543",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2009/3316",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "http://www.vupen.com/english/advisories/2011/0359",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=512921",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1199.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-10-30 16:29
Modified
2025-04-20 01:37
Summary
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
References
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2014/07/08/11Mailing List
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=787104Issue Tracking
secalert@redhat.comhttps://issues.apache.org/jira/browse/XERCESJ-1685Issue Tracking, Patch, Vendor Advisory
secalert@redhat.comhttps://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
secalert@redhat.comhttps://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E
secalert@redhat.comhttps://www.oracle.com//security-alerts/cpujul2021.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/08/11Mailing List
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=787104Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://issues.apache.org/jira/browse/XERCESJ-1685Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.html
Impacted products
Vendor Product Version
apache xerces2_java *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C8459C1-2465-4E59-95E9-1AF6736C3D62",
                     versionEndIncluding: "2.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.",
      },
      {
         lang: "es",
         value: "Apache Xerces2 Java Parser en versiones anteriores a la 2.12.0 permite que atacantes remotos provoquen una denegación de servicio (consumo de CPU) mediante un mensaje manipulado a un servicio XML, lo que desencadena las colisiones de tabla hash.",
      },
   ],
   id: "CVE-2012-0881",
   lastModified: "2025-04-20T01:37:25.860",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-10-30T16:29:00.270",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2014/07/08/11",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=787104",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://issues.apache.org/jira/browse/XERCESJ-1685",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E",
      },
      {
         source: "secalert@redhat.com",
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2014/07/08/11",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=787104",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://issues.apache.org/jira/browse/XERCESJ-1685",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2012-0881
Vulnerability from cvelistv5
Published
2017-10-30 16:00
Modified
2024-08-06 18:38
Severity ?
Summary
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T18:38:15.063Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
               },
               {
                  name: "[oss-security] 20140708 Summer bug cleaning - some Hash DoS stuff",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2014/07/08/11",
               },
               {
                  name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
               },
               {
                  name: "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E",
               },
               {
                  name: "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E",
               },
               {
                  name: "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E",
               },
               {
                  name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.apache.org/jira/browse/XERCESJ-1685",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=787104",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  name: "[hadoop-common-issues] 20210928 [GitHub] [hadoop] warrenzhu25 opened a new pull request #3496: HADOOP-17941. Update xerces to 2.12",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-07-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-28T19:06:16",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
            },
            {
               name: "[oss-security] 20140708 Summer bug cleaning - some Hash DoS stuff",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2014/07/08/11",
            },
            {
               name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
            },
            {
               name: "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E",
            },
            {
               name: "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E",
            },
            {
               name: "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E",
            },
            {
               name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.apache.org/jira/browse/XERCESJ-1685",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=787104",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               name: "[hadoop-common-issues] 20210928 [GitHub] [hadoop] warrenzhu25 opened a new pull request #3496: HADOOP-17941. Update xerces to 2.12",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56%40%3Ccommon-issues.hadoop.apache.org%3E",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2012-0881",
      datePublished: "2017-10-30T16:00:00",
      dateReserved: "2012-01-19T00:00:00",
      dateUpdated: "2024-08-06T18:38:15.063Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2009-2625
Vulnerability from cvelistv5
Published
2009-08-06 15:00
Modified
2024-08-07 05:59
Severity ?
Summary
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
References
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026vendor-advisory, x_refsource_SLACKWARE
https://rhn.redhat.com/errata/RHSA-2009-1200.htmlvendor-advisory, x_refsource_REDHAT
https://rhn.redhat.com/errata/RHSA-2009-1199.htmlvendor-advisory, x_refsource_REDHAT
http://www.networkworld.com/columnists/2009/080509-xml-flaw.htmlx_refsource_MISC
http://www.ubuntu.com/usn/USN-890-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/36162third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/2543vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2010/dsa-1984vendor-advisory, x_refsource_DEBIAN
http://www.openwall.com/lists/oss-security/2009/10/22/9mailing-list, x_refsource_MLIST
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/37460third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2009-1615.htmlvendor-advisory, x_refsource_REDHAT
http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlx_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=125787273209737&w=2vendor-advisory, x_refsource_HP
http://secunia.com/advisories/37754third-party-advisory, x_refsource_SECUNIA
https://rhn.redhat.com/errata/RHSA-2009-1637.htmlvendor-advisory, x_refsource_REDHAT
http://www.cert.fi/en/reports/2009/vulnerability2009085.htmlx_refsource_MISC
http://www.codenomicon.com/labs/xml/x_refsource_MISC
http://secunia.com/advisories/36199third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2012-1537.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.htmlvendor-advisory, x_refsource_SUSE
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209vendor-advisory, x_refsource_MANDRIVA
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.htmlvendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2011-0858.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=125787273209737&w=2vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id?1022680vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/37671third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/38342third-party-advisory, x_refsource_SECUNIA
https://rhn.redhat.com/errata/RHSA-2009-1636.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/35958vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/507985/100/0/threadedmailing-list, x_refsource_BUGTRAQ
https://rhn.redhat.com/errata/RHSA-2009-1649.htmlvendor-advisory, x_refsource_REDHAT
http://www.openwall.com/lists/oss-security/2009/10/26/3mailing-list, x_refsource_MLIST
http://www.us-cert.gov/cas/techalerts/TA09-294A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/50549third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/36180third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/38231third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1vendor-advisory, x_refsource_SUNALERT
http://www.mandriva.com/security/advisories?name=MDVSA-2011:108vendor-advisory, x_refsource_MANDRIVA
http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.htmlx_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.htmlx_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1x_refsource_CONFIRM
http://secunia.com/advisories/36176third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/43300third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356vdb-entry, signature, x_refsource_OVAL
http://www.us-cert.gov/cas/techalerts/TA10-012A.htmlthird-party-advisory, x_refsource_CERT
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2012-1232.htmlvendor-advisory, x_refsource_REDHAT
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1vendor-advisory, x_refsource_SUNALERT
http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=hx_refsource_CONFIRM
http://secunia.com/advisories/37300third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.htmlvendor-advisory, x_refsource_APPLE
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.htmlvendor-advisory, x_refsource_SUSE
https://bugzilla.redhat.com/show_bug.cgi?id=512921x_refsource_CONFIRM
https://rhn.redhat.com/errata/RHSA-2009-1201.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlvendor-advisory, x_refsource_SUSE
http://www.openwall.com/lists/oss-security/2009/09/06/1mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2009/10/23/6mailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2011/0359vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2009/3316vdb-entry, x_refsource_VUPEN
https://rhn.redhat.com/errata/RHSA-2009-1650.htmlvendor-advisory, x_refsource_REDHAT
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3Emailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T05:59:56.314Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "SSA:2011-041-02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
               },
               {
                  name: "RHSA-2009:1200",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html",
               },
               {
                  name: "RHSA-2009:1199",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1199.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
               },
               {
                  name: "USN-890-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-890-1",
               },
               {
                  name: "36162",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36162",
               },
               {
                  name: "ADV-2009-2543",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2009/2543",
               },
               {
                  name: "DSA-1984",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2010/dsa-1984",
               },
               {
                  name: "[oss-security] 20091022 Re: Regarding expat bug 1990430",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/10/22/9",
               },
               {
                  name: "1021506",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1",
               },
               {
                  name: "37460",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/37460",
               },
               {
                  name: "RHSA-2009:1615",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2009-1615.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
               },
               {
                  name: "HPSBUX02476",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
               },
               {
                  name: "37754",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/37754",
               },
               {
                  name: "RHSA-2009:1637",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.codenomicon.com/labs/xml/",
               },
               {
                  name: "36199",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36199",
               },
               {
                  name: "RHSA-2012:1537",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2012-1537.html",
               },
               {
                  name: "SUSE-SR:2010:013",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
               },
               {
                  name: "MDVSA-2009:209",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209",
               },
               {
                  name: "FEDORA-2009-8329",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html",
               },
               {
                  name: "RHSA-2011:0858",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2011-0858.html",
               },
               {
                  name: "SSRT090250",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
               },
               {
                  name: "1022680",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1022680",
               },
               {
                  name: "37671",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/37671",
               },
               {
                  name: "38342",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38342",
               },
               {
                  name: "RHSA-2009:1636",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html",
               },
               {
                  name: "35958",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/35958",
               },
               {
                  name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
               },
               {
                  name: "RHSA-2009:1649",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html",
               },
               {
                  name: "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/10/26/3",
               },
               {
                  name: "TA09-294A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html",
               },
               {
                  name: "50549",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/50549",
               },
               {
                  name: "oval:org.mitre.oval:def:8520",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520",
               },
               {
                  name: "36180",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36180",
               },
               {
                  name: "38231",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/38231",
               },
               {
                  name: "272209",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1",
               },
               {
                  name: "MDVSA-2011:108",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
               },
               {
                  name: "36176",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/36176",
               },
               {
                  name: "FEDORA-2009-8337",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html",
               },
               {
                  name: "43300",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/43300",
               },
               {
                  name: "oval:org.mitre.oval:def:9356",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356",
               },
               {
                  name: "TA10-012A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA10-012A.html",
               },
               {
                  name: "SUSE-SR:2009:016",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html",
               },
               {
                  name: "RHSA-2012:1232",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
               },
               {
                  name: "263489",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h",
               },
               {
                  name: "37300",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/37300",
               },
               {
                  name: "APPLE-SA-2009-09-03-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html",
               },
               {
                  name: "SUSE-SA:2009:053",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=512921",
               },
               {
                  name: "RHSA-2009:1201",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html",
               },
               {
                  name: "SUSE-SR:2009:017",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html",
               },
               {
                  name: "[oss-security] 20090906 Re: Re: expat bug 1990430",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/09/06/1",
               },
               {
                  name: "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2009/10/23/6",
               },
               {
                  name: "ADV-2011-0359",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2011/0359",
               },
               {
                  name: "ADV-2009-3316",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2009/3316",
               },
               {
                  name: "RHSA-2009:1650",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html",
               },
               {
                  name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2009-08-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-03-20T16:06:10",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "SSA:2011-041-02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
            },
            {
               name: "RHSA-2009:1200",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html",
            },
            {
               name: "RHSA-2009:1199",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1199.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
            },
            {
               name: "USN-890-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-890-1",
            },
            {
               name: "36162",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36162",
            },
            {
               name: "ADV-2009-2543",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2009/2543",
            },
            {
               name: "DSA-1984",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2010/dsa-1984",
            },
            {
               name: "[oss-security] 20091022 Re: Regarding expat bug 1990430",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/10/22/9",
            },
            {
               name: "1021506",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1",
            },
            {
               name: "37460",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/37460",
            },
            {
               name: "RHSA-2009:1615",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2009-1615.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
            },
            {
               name: "HPSBUX02476",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
            },
            {
               name: "37754",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/37754",
            },
            {
               name: "RHSA-2009:1637",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.codenomicon.com/labs/xml/",
            },
            {
               name: "36199",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36199",
            },
            {
               name: "RHSA-2012:1537",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2012-1537.html",
            },
            {
               name: "SUSE-SR:2010:013",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
            },
            {
               name: "MDVSA-2009:209",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209",
            },
            {
               name: "FEDORA-2009-8329",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html",
            },
            {
               name: "RHSA-2011:0858",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2011-0858.html",
            },
            {
               name: "SSRT090250",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
            },
            {
               name: "1022680",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1022680",
            },
            {
               name: "37671",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/37671",
            },
            {
               name: "38342",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38342",
            },
            {
               name: "RHSA-2009:1636",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html",
            },
            {
               name: "35958",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/35958",
            },
            {
               name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
            },
            {
               name: "RHSA-2009:1649",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html",
            },
            {
               name: "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/10/26/3",
            },
            {
               name: "TA09-294A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html",
            },
            {
               name: "50549",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/50549",
            },
            {
               name: "oval:org.mitre.oval:def:8520",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520",
            },
            {
               name: "36180",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36180",
            },
            {
               name: "38231",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/38231",
            },
            {
               name: "272209",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1",
            },
            {
               name: "MDVSA-2011:108",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
            },
            {
               name: "36176",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/36176",
            },
            {
               name: "FEDORA-2009-8337",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html",
            },
            {
               name: "43300",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/43300",
            },
            {
               name: "oval:org.mitre.oval:def:9356",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356",
            },
            {
               name: "TA10-012A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA10-012A.html",
            },
            {
               name: "SUSE-SR:2009:016",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html",
            },
            {
               name: "RHSA-2012:1232",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
            },
            {
               name: "263489",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h",
            },
            {
               name: "37300",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/37300",
            },
            {
               name: "APPLE-SA-2009-09-03-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html",
            },
            {
               name: "SUSE-SA:2009:053",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=512921",
            },
            {
               name: "RHSA-2009:1201",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html",
            },
            {
               name: "SUSE-SR:2009:017",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html",
            },
            {
               name: "[oss-security] 20090906 Re: Re: expat bug 1990430",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/09/06/1",
            },
            {
               name: "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2009/10/23/6",
            },
            {
               name: "ADV-2011-0359",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2011/0359",
            },
            {
               name: "ADV-2009-3316",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2009/3316",
            },
            {
               name: "RHSA-2009:1650",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html",
            },
            {
               name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2009-2625",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "SSA:2011-041-02",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026",
                  },
                  {
                     name: "RHSA-2009:1200",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html",
                  },
                  {
                     name: "RHSA-2009:1199",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1199.html",
                  },
                  {
                     name: "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
                     refsource: "MISC",
                     url: "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html",
                  },
                  {
                     name: "USN-890-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-890-1",
                  },
                  {
                     name: "36162",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36162",
                  },
                  {
                     name: "ADV-2009-2543",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2009/2543",
                  },
                  {
                     name: "DSA-1984",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2010/dsa-1984",
                  },
                  {
                     name: "[oss-security] 20091022 Re: Regarding expat bug 1990430",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/10/22/9",
                  },
                  {
                     name: "1021506",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1",
                  },
                  {
                     name: "37460",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/37460",
                  },
                  {
                     name: "RHSA-2009:1615",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2009-1615.html",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2009-0016.html",
                  },
                  {
                     name: "HPSBUX02476",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
                  },
                  {
                     name: "37754",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/37754",
                  },
                  {
                     name: "RHSA-2009:1637",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html",
                  },
                  {
                     name: "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
                     refsource: "MISC",
                     url: "http://www.cert.fi/en/reports/2009/vulnerability2009085.html",
                  },
                  {
                     name: "http://www.codenomicon.com/labs/xml/",
                     refsource: "MISC",
                     url: "http://www.codenomicon.com/labs/xml/",
                  },
                  {
                     name: "36199",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36199",
                  },
                  {
                     name: "RHSA-2012:1537",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2012-1537.html",
                  },
                  {
                     name: "SUSE-SR:2010:013",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html",
                  },
                  {
                     name: "MDVSA-2009:209",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209",
                  },
                  {
                     name: "FEDORA-2009-8329",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html",
                  },
                  {
                     name: "RHSA-2011:0858",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2011-0858.html",
                  },
                  {
                     name: "SSRT090250",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2",
                  },
                  {
                     name: "1022680",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1022680",
                  },
                  {
                     name: "37671",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/37671",
                  },
                  {
                     name: "38342",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38342",
                  },
                  {
                     name: "RHSA-2009:1636",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html",
                  },
                  {
                     name: "35958",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/35958",
                  },
                  {
                     name: "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/507985/100/0/threaded",
                  },
                  {
                     name: "RHSA-2009:1649",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html",
                  },
                  {
                     name: "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/10/26/3",
                  },
                  {
                     name: "TA09-294A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html",
                  },
                  {
                     name: "50549",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/50549",
                  },
                  {
                     name: "oval:org.mitre.oval:def:8520",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520",
                  },
                  {
                     name: "36180",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36180",
                  },
                  {
                     name: "38231",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/38231",
                  },
                  {
                     name: "272209",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1",
                  },
                  {
                     name: "MDVSA-2011:108",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
                  },
                  {
                     name: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
                     refsource: "CONFIRM",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
                  },
                  {
                     name: "36176",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/36176",
                  },
                  {
                     name: "FEDORA-2009-8337",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html",
                  },
                  {
                     name: "43300",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/43300",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9356",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356",
                  },
                  {
                     name: "TA10-012A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA10-012A.html",
                  },
                  {
                     name: "SUSE-SR:2009:016",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html",
                  },
                  {
                     name: "RHSA-2012:1232",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2012-1232.html",
                  },
                  {
                     name: "263489",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1",
                  },
                  {
                     name: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h",
                     refsource: "CONFIRM",
                     url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h",
                  },
                  {
                     name: "37300",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/37300",
                  },
                  {
                     name: "APPLE-SA-2009-09-03-1",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html",
                  },
                  {
                     name: "SUSE-SA:2009:053",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=512921",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=512921",
                  },
                  {
                     name: "RHSA-2009:1201",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html",
                  },
                  {
                     name: "SUSE-SR:2009:017",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html",
                  },
                  {
                     name: "[oss-security] 20090906 Re: Re: expat bug 1990430",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/09/06/1",
                  },
                  {
                     name: "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2009/10/23/6",
                  },
                  {
                     name: "ADV-2011-0359",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2011/0359",
                  },
                  {
                     name: "ADV-2009-3316",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2009/3316",
                  },
                  {
                     name: "RHSA-2009:1650",
                     refsource: "REDHAT",
                     url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html",
                  },
                  {
                     name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2009-2625",
      datePublished: "2009-08-06T15:00:00",
      dateReserved: "2009-07-28T00:00:00",
      dateUpdated: "2024-08-07T05:59:56.314Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2013-4002
Vulnerability from cvelistv5
Published
2013-07-23 10:00
Modified
2024-08-06 16:30
Severity ?
Summary
XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
References
http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015vendor-advisory, x_refsource_AIXAPAR
http://rhn.redhat.com/errata/RHSA-2013-1060.htmlvendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2014:0414vendor-advisory, x_refsource_REDHAT
http://security.gentoo.org/glsa/glsa-201406-32.xmlvendor-advisory, x_refsource_GENTOO
http://rhn.redhat.com/errata/RHSA-2013-1447.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2015-0765.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-1440.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2015-0675.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/61310vdb-entry, x_refsource_BID
http://rhn.redhat.com/errata/RHSA-2015-0773.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2015-0720.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.htmlvendor-advisory, x_refsource_SUSE
http://www.ubuntu.com/usn/USN-2033-1vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2089-1vendor-advisory, x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.htmlvendor-advisory, x_refsource_SUSE
http://marc.info/?l=bugtraq&m=138674073720143&w=2vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2013-1505.htmlvendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=138674031212883&w=2vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1822.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/56257third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2013-1059.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2014-1823.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.htmlvendor-advisory, x_refsource_APPLE
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2013-1081.htmlvendor-advisory, x_refsource_REDHAT
https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3Emailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2013-1451.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2014-1818.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2014-1821.htmlvendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.htmlvendor-advisory, x_refsource_SUSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/85260vdb-entry, x_refsource_XF
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3Emailing-list, x_refsource_MLIST
https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3Emailing-list, x_refsource_MLIST
https://www.oracle.com/security-alerts/cpuapr2022.htmlx_refsource_MISC
http://www.ibm.com/support/docview.wss?uid=swg21648172x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21657539x_refsource_CONFIRM
https://issues.apache.org/jira/browse/XERCESJ-1679x_refsource_CONFIRM
http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patchx_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21644197x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21653371x_refsource_CONFIRM
http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013x_refsource_MISC
http://support.apple.com/kb/HT5982x_refsource_CONFIRM
https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.htmlx_refsource_CONFIRM
http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002x_refsource_CONFIRM
http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.htmlx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T16:30:49.315Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "IC98015",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_AIXAPAR",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
               },
               {
                  name: "RHSA-2013:1060",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
               },
               {
                  name: "RHSA-2014:0414",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2014:0414",
               },
               {
                  name: "GLSA-201406-32",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-201406-32.xml",
               },
               {
                  name: "RHSA-2013:1447",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
               },
               {
                  name: "RHSA-2015:0765",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
               },
               {
                  name: "RHSA-2013:1440",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
               },
               {
                  name: "RHSA-2015:0675",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
               },
               {
                  name: "61310",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/61310",
               },
               {
                  name: "RHSA-2015:0773",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
               },
               {
                  name: "RHSA-2015:0720",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
               },
               {
                  name: "SUSE-SU-2013:1257",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
               },
               {
                  name: "USN-2033-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2033-1",
               },
               {
                  name: "USN-2089-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2089-1",
               },
               {
                  name: "SUSE-SU-2013:1256",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
               },
               {
                  name: "HPSBUX02944",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
               },
               {
                  name: "RHSA-2013:1505",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
               },
               {
                  name: "HPSBUX02943",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
               },
               {
                  name: "RHSA-2014:1822",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
               },
               {
                  name: "56257",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/56257",
               },
               {
                  name: "SUSE-SU-2013:1263",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
               },
               {
                  name: "RHSA-2013:1059",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
               },
               {
                  name: "RHSA-2014:1823",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
               },
               {
                  name: "openSUSE-SU-2013:1663",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
               },
               {
                  name: "SUSE-SU-2013:1666",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
               },
               {
                  name: "APPLE-SA-2013-10-15-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
               },
               {
                  name: "SUSE-SU-2013:1293",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
               },
               {
                  name: "RHSA-2013:1081",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
               },
               {
                  name: "[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
               },
               {
                  name: "SUSE-SU-2013:1255",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
               },
               {
                  name: "RHSA-2013:1451",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
               },
               {
                  name: "RHSA-2014:1818",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
               },
               {
                  name: "RHSA-2014:1821",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
               },
               {
                  name: "SUSE-SU-2013:1305",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
               },
               {
                  name: "ibm-java-cve20134002-dos(85260)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
               },
               {
                  name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
               },
               {
                  name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/support/docview.wss?uid=swg21648172",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://issues.apache.org/jira/browse/XERCESJ-1679",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.apple.com/kb/HT5982",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2013-07-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-19T23:19:06",
            orgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
            shortName: "ibm",
         },
         references: [
            {
               name: "IC98015",
               tags: [
                  "vendor-advisory",
                  "x_refsource_AIXAPAR",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
            },
            {
               name: "RHSA-2013:1060",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
            },
            {
               name: "RHSA-2014:0414",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2014:0414",
            },
            {
               name: "GLSA-201406-32",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-201406-32.xml",
            },
            {
               name: "RHSA-2013:1447",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
            },
            {
               name: "RHSA-2015:0765",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
            },
            {
               name: "RHSA-2013:1440",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
            },
            {
               name: "RHSA-2015:0675",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
            },
            {
               name: "61310",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/61310",
            },
            {
               name: "RHSA-2015:0773",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
            },
            {
               name: "RHSA-2015:0720",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
            },
            {
               name: "SUSE-SU-2013:1257",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
            },
            {
               name: "USN-2033-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2033-1",
            },
            {
               name: "USN-2089-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2089-1",
            },
            {
               name: "SUSE-SU-2013:1256",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
            },
            {
               name: "HPSBUX02944",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
            },
            {
               name: "RHSA-2013:1505",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
            },
            {
               name: "HPSBUX02943",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
            },
            {
               name: "RHSA-2014:1822",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
            },
            {
               name: "56257",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/56257",
            },
            {
               name: "SUSE-SU-2013:1263",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
            },
            {
               name: "RHSA-2013:1059",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
            },
            {
               name: "RHSA-2014:1823",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
            },
            {
               name: "openSUSE-SU-2013:1663",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
            },
            {
               name: "SUSE-SU-2013:1666",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
            },
            {
               name: "APPLE-SA-2013-10-15-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
            },
            {
               name: "SUSE-SU-2013:1293",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
            },
            {
               name: "RHSA-2013:1081",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
            },
            {
               name: "[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
            },
            {
               name: "SUSE-SU-2013:1255",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
            },
            {
               name: "RHSA-2013:1451",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
            },
            {
               name: "RHSA-2014:1818",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
            },
            {
               name: "RHSA-2014:1821",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
            },
            {
               name: "SUSE-SU-2013:1305",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
            },
            {
               name: "ibm-java-cve20134002-dos(85260)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
            },
            {
               name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
            },
            {
               name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/support/docview.wss?uid=swg21648172",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://issues.apache.org/jira/browse/XERCESJ-1679",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.apple.com/kb/HT5982",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@us.ibm.com",
               ID: "CVE-2013-4002",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "IC98015",
                     refsource: "AIXAPAR",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
                  },
                  {
                     name: "RHSA-2013:1060",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
                  },
                  {
                     name: "RHSA-2014:0414",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2014:0414",
                  },
                  {
                     name: "GLSA-201406-32",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-201406-32.xml",
                  },
                  {
                     name: "RHSA-2013:1447",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
                  },
                  {
                     name: "RHSA-2015:0765",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
                  },
                  {
                     name: "RHSA-2013:1440",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
                  },
                  {
                     name: "RHSA-2015:0675",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
                  },
                  {
                     name: "61310",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/61310",
                  },
                  {
                     name: "RHSA-2015:0773",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
                  },
                  {
                     name: "RHSA-2015:0720",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
                  },
                  {
                     name: "SUSE-SU-2013:1257",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
                  },
                  {
                     name: "USN-2033-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2033-1",
                  },
                  {
                     name: "USN-2089-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2089-1",
                  },
                  {
                     name: "SUSE-SU-2013:1256",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
                  },
                  {
                     name: "HPSBUX02944",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
                  },
                  {
                     name: "RHSA-2013:1505",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
                  },
                  {
                     name: "HPSBUX02943",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
                  },
                  {
                     name: "RHSA-2014:1822",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
                  },
                  {
                     name: "56257",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/56257",
                  },
                  {
                     name: "SUSE-SU-2013:1263",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
                  },
                  {
                     name: "RHSA-2013:1059",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
                  },
                  {
                     name: "RHSA-2014:1823",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
                  },
                  {
                     name: "openSUSE-SU-2013:1663",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
                  },
                  {
                     name: "SUSE-SU-2013:1666",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
                  },
                  {
                     name: "APPLE-SA-2013-10-15-1",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
                  },
                  {
                     name: "SUSE-SU-2013:1293",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
                  },
                  {
                     name: "RHSA-2013:1081",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
                  },
                  {
                     name: "[j-users] 20180503 [ANNOUNCEMENT]: Apache Xerces-J 2.12.0 now available",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E",
                  },
                  {
                     name: "SUSE-SU-2013:1255",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
                  },
                  {
                     name: "RHSA-2013:1451",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
                  },
                  {
                     name: "RHSA-2014:1818",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
                  },
                  {
                     name: "RHSA-2014:1821",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
                  },
                  {
                     name: "SUSE-SU-2013:1305",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
                  },
                  {
                     name: "ibm-java-cve20134002-dos(85260)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
                  },
                  {
                     name: "[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E",
                  },
                  {
                     name: "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1",
                     refsource: "MLIST",
                     url: "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                  },
                  {
                     name: "http://www.ibm.com/support/docview.wss?uid=swg21648172",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/support/docview.wss?uid=swg21648172",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
                  },
                  {
                     name: "https://issues.apache.org/jira/browse/XERCESJ-1679",
                     refsource: "CONFIRM",
                     url: "https://issues.apache.org/jira/browse/XERCESJ-1679",
                  },
                  {
                     name: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
                     refsource: "CONFIRM",
                     url: "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
                  },
                  {
                     name: "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
                     refsource: "MISC",
                     url: "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
                  },
                  {
                     name: "http://support.apple.com/kb/HT5982",
                     refsource: "CONFIRM",
                     url: "http://support.apple.com/kb/HT5982",
                  },
                  {
                     name: "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
                     refsource: "CONFIRM",
                     url: "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
                  },
                  {
                     name: "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
                     refsource: "CONFIRM",
                     url: "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
                  },
                  {
                     name: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
                     refsource: "CONFIRM",
                     url: "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "9a959283-ebb5-44b6-b705-dcc2bbced522",
      assignerShortName: "ibm",
      cveId: "CVE-2013-4002",
      datePublished: "2013-07-23T10:00:00",
      dateReserved: "2013-06-07T00:00:00",
      dateUpdated: "2024-08-06T16:30:49.315Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}