Description
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1853-1 | libspring-java security update |
EUVD |
EUVD-2018-0524 | Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file. |
Github GHSA |
GHSA-6v7w-535j-rq5m | Pivotal Spring Framework DoS Attack with XML Input |
Ubuntu USN |
USN-4774-1 | Spring Framework vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T05:39:31.943Z
Reserved: 2015-04-10T00:00:00.000Z
Link: CVE-2015-3192
No data.
Status : Modified
Published: 2016-07-12T19:59:00.240
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-3192
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN