CVE-2011-1755
jabberd: DoS via the XML "billion laughs attack"
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
jabberd2 before 2.2.14 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
jabberd2 antes de v2.2.14 no detecta correctamente la recursividad durante la expansión de la entidad, lo que permite a atacantes remotos provocar una denegación de servicio ( consumo de memoria y CPU ) a través de un documento XML manipulado que contiene un gran número de referencias a entidades anidadas, un problema similar a CVE-2003-1564.
This package provides jabberd 2, an Extensible Messaging and Presence Protocol server used for XML based communication. It was found that the jabberd daemon did not properly detect recursion during entity expansion. A remote attacker could provide a specially-crafted XML file containing a large number of nested entity references, which once processed by the jabberd daemon, could lead to a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-04-19 CVE Reserved
- 2011-06-17 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://codex.xiaoka.com/svn/jabberd2/tags/jabberd-2.2.14/ChangeLog | Broken Link | |
http://secunia.com/advisories/44957 | Broken Link | |
http://secunia.com/advisories/45112 | Broken Link | |
http://support.apple.com/kb/HT5002 | Third Party Advisory |
|
http://www.mail-archive.com/jabberd2%40lists.xiaoka.com/msg01655.html | Mailing List | |
http://www.securityfocus.com/bid/48250 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67770 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=700390 | 2011-06-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jabberd2 Search vendor "Jabberd2" | Jabberd2 Search vendor "Jabberd2" for product "Jabberd2" | < 2.2.14 Search vendor "Jabberd2" for product "Jabberd2" and version " < 2.2.14" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 13 Search vendor "Fedoraproject" for product "Fedora" and version "13" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 14 Search vendor "Fedoraproject" for product "Fedora" and version "14" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 15 Search vendor "Fedoraproject" for product "Fedora" and version "15" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | < 10.6.8 Search vendor "Apple" for product "Mac Os X" and version " < 10.6.8" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | >= 10.7.0 < 10.7.2 Search vendor "Apple" for product "Mac Os X" and version " >= 10.7.0 < 10.7.2" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | < 10.6.8 Search vendor "Apple" for product "Mac Os X Server" and version " < 10.6.8" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Server Search vendor "Apple" for product "Mac Os X Server" | >= 10.7.0 < 10.7.2 Search vendor "Apple" for product "Mac Os X Server" and version " >= 10.7.0 < 10.7.2" | - |
Affected
|