The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver.
XStream 1.4.21 detects the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead.
The only solution is to catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for CVE-2024-47072.
Alexis Challande of Trail Of Bits found and reported the issue to XStream and provided the required information to reproduce it.
{ "nvd_published_at": "2024-11-08T00:15:14Z", "cwe_ids": [ "CWE-121", "CWE-502" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-11-07T21:51:17Z" }