Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Poi | Apache | * | 3.14 (including) |
Libapache-poi-java | Ubuntu | artful | * |
Libapache-poi-java | Ubuntu | esm-apps/xenial | * |
Libapache-poi-java | Ubuntu | precise | * |
Libapache-poi-java | Ubuntu | trusty | * |
Libapache-poi-java | Ubuntu | upstream | * |
Libapache-poi-java | Ubuntu | xenial | * |
Libapache-poi-java | Ubuntu | yakkety | * |
Libapache-poi-java | Ubuntu | zesty | * |