// For flags

CVE-2016-0466

OpenJDK: insufficient enforcement of totalEntitySizeLimit (JAXP, 8133962)

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.

Vulnerabilidad no especificada en los componentes Java SE, Java SE Embedded y JRockit en Oracle Java SE 6u105, 7u91 y 8u66; Java SE Embedded 8u65 y JRockit R28.3.8 permite a atacantes remotos afectar a la disponibilidad a través de vectores relacionados con JAXP.

It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-12-09 CVE Reserved
  • 2016-01-21 CVE Published
  • 2023-11-12 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (30)
URL Date SRC
URL Date SRC
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html 2022-05-13
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0049.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0050.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0053.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0054.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0055.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0056.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0057.html 2022-05-13
http://rhn.redhat.com/errata/RHSA-2016-0067.html 2022-05-13
http://www.debian.org/security/2016/dsa-3458 2022-05-13
http://www.debian.org/security/2016/dsa-3465 2022-05-13
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html 2022-05-13
http://www.ubuntu.com/usn/USN-2884-1 2022-05-13
http://www.ubuntu.com/usn/USN-2885-1 2022-05-13
https://access.redhat.com/errata/RHSA-2016:1430 2022-05-13
https://security.gentoo.org/glsa/201603-14 2022-05-13
https://security.gentoo.org/glsa/201610-08 2022-05-13
https://access.redhat.com/security/cve/CVE-2016-0466 2016-07-18
https://bugzilla.redhat.com/show_bug.cgi?id=1299385 2016-07-18
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
15.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "15.10"
-
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.6.0
Search vendor "Oracle" for product "Jdk" and version "1.6.0"
update105
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update91
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
update66
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.6.0
Search vendor "Oracle" for product "Jre" and version "1.6.0"
update105
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.7.0
Search vendor "Oracle" for product "Jre" and version "1.7.0"
update91
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
update66
Affected