Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2011-1753
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
expat_erl.c in ejabberd before 2.1.7 and 3.x before 3.0.0-alpha-3, and exmpp before 0.9.7, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:process-one:ejabberd:3.0.0:alpha1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:3.0.0:alpha2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.1_2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:exmpp:0.9.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:exmpp:0.9.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:exmpp:0.9.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:exmpp:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:exmpp:0.9.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:process-one:exmpp:0.9.1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://secunia.com/advisories/44807
- http://www.debian.org/security/2011/dsa-2248
- http://www.ejabberd.im/ejabberd-2.1.7
- http://www.process-one.net/en/ejabberd/release_notes/release_note_ejabberd_2.1.7/
- https://bugzilla.redhat.com/show_bug.cgi?id=700454
- http://secunia.com/advisories/44765
- https://git.process-one.net/ejabberd/mainline/commit/bd1df027c622e1f96f9eeaac612a6a956c1
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062099.html
- http://secunia.com/advisories/45120
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062145.html
- http://www.securityfocus.com/bid/48072
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67769