CVE-2014-3574: Improper Input Validation in Apache POI
(updated )
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
References
- poi.apache.org/changes.html
- rhn.redhat.com/errata/RHSA-2014-1370.html
- rhn.redhat.com/errata/RHSA-2014-1398.html
- rhn.redhat.com/errata/RHSA-2014-1399.html
- rhn.redhat.com/errata/RHSA-2014-1400.html
- www-01.ibm.com/support/docview.wss?uid=swg21996759
- www.apache.org/dist/poi/release/RELEASE-NOTES.txt
- exchange.xforce.ibmcloud.com/vulnerabilities/95768
- github.com/advisories/GHSA-5wfp-8643-c58x
- lucene.apache.org/solr/solrnews.html
- nvd.nist.gov/vuln/detail/CVE-2014-3574
Detect and mitigate CVE-2014-3574 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →