7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.002 Low
EPSS
Percentile
53.4%
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
CPE | Name | Operator | Version |
---|---|---|---|
xalan:xalan | eq | 2.5.1 | |
xalan:xalan | eq | 2.6.0 | |
xalan:xalan | eq | 2.4.1 | |
xalan:xalan | eq | 2.3.1 | |
xalan:xalan | eq | 2.5.D1 | |
xalan:xalan | eq | 2.7.0 | |
xalan:xalan | eq | 2.7.1 | |
xalan:xalan | eq | 2.5.0 | |
xalan:xalan | eq | 2.1.0 | |
xalan:xalan | eq | 2.4.0 |
packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
www.openwall.com/lists/oss-security/2022/07/19/5
www.openwall.com/lists/oss-security/2022/07/19/6
www.openwall.com/lists/oss-security/2022/07/20/2
www.openwall.com/lists/oss-security/2022/07/20/3
www.openwall.com/lists/oss-security/2022/10/18/2
www.openwall.com/lists/oss-security/2022/11/04/8
www.openwall.com/lists/oss-security/2022/11/07/2
gitbox.apache.org/repos/asf?p=xalan-java.git
gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
lists.debian.org/debian-lts-announce/2022/10/msg00024.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
lists.fedoraproject.org/archives/list/[email protected]/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
lists.fedoraproject.org/archives/list/[email protected]/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
lists.fedoraproject.org/archives/list/[email protected]/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
lists.fedoraproject.org/archives/list/[email protected]/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
lists.fedoraproject.org/archives/list/[email protected]/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
lists.fedoraproject.org/archives/list/[email protected]/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
nvd.nist.gov/vuln/detail/CVE-2022-34169
security.gentoo.org/glsa/202401-25
security.netapp.com/advisory/ntap-20220729-0009
security.netapp.com/advisory/ntap-20240621-0006
www.debian.org/security/2022/dsa-5188
www.debian.org/security/2022/dsa-5192
www.debian.org/security/2022/dsa-5256
www.oracle.com/security-alerts/cpujul2022.html
xalan.apache.org