parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libxml2", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "libxml2-dbg", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "libxml2-dev", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "libxml2-doc", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "libxml2-udeb", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "libxml2-utils", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "libxml2-utils-dbg", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "python-libxml2", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" }, { "binary_name": "python-libxml2-dbg", "binary_version": "2.9.1+dfsg1-3ubuntu4.4" } ] }