Stack-based Buffer Overflow
CVE-2024-47072
Summary
XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a Denial of Service(DoS) only by manipulating the processed input stream when XStream is configured to use the "BinaryStreamDriver". XStream has been patched to detect the manipulation in the binary input stream causing the stack overflow and raises an InputManipulationException instead. This issue affects com.thoughtworks.xstream:xstream versions prior to 1.4.21. Users are advised to upgrade. Users unable to upgrade may catch the "StackOverflowError" in the client code calling XStream if XStream is configured to use the "BinaryStreamDriver".
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-121 - Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
References
Advisory Timeline
- Published