UBUNTU-CVE-2015-8978

Source
https://ubuntu.com/security/CVE-2015-8978
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-8978.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2015-8978
Upstream
Withdrawn
2025-07-18T16:43:20Z
Published
2016-11-22T17:59:00Z
Modified
2025-07-16T08:18:34.888613Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

In Soap Lite (aka the SOAP::Lite extension for Perl) 1.14 and earlier, an example attack consists of defining 10 or more XML entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. The amount of computer memory used for handling an external SOAP call would likely exceed that available to the process parsing the XML.

References

Affected packages

Ubuntu:16.04:LTS / libsoap-lite-perl

Package

Name
libsoap-lite-perl
Purl
pkg:deb/ubuntu/libsoap-lite-perl@1.19-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19-1

Affected versions

1.*

1.11-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.19-1",
            "binary_name": "libsoap-lite-perl"
        }
    ],
    "availability": "No subscription required"
}