Theres a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xerces-j | Apache | * | 2.12.1 (including) |
Red Hat JBoss Enterprise Application Platform 7 | RedHat | xerces-j2 | * |
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8 | RedHat | eap7-xerces-j2-0:2.12.0-3.SP04_redhat_00001.1.el8eap | * |
Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7 | RedHat | eap7-xerces-j2-0:2.12.0-3.SP04_redhat_00001.1.el7eap | * |
RHPAM 7.13.1 async | RedHat | xercesimpl | * |
Libxerces2-java | Ubuntu | bionic | * |
Libxerces2-java | Ubuntu | impish | * |
Libxerces2-java | Ubuntu | kinetic | * |
Libxerces2-java | Ubuntu | lunar | * |
Libxerces2-java | Ubuntu | mantic | * |
Libxerces2-java | Ubuntu | trusty | * |
Libxerces2-java | Ubuntu | trusty/esm | * |
Libxerces2-java | Ubuntu | xenial | * |