Description
Apache POI before 3.10.1 and 3.11.x before 3.11-beta2 allows remote attackers to cause a denial of service (CPU consumption and crash) via a crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
Remediation
References
http://poi.apache.org/changes.html
http://rhn.redhat.com/errata/RHSA-2014-1370.html
http://rhn.redhat.com/errata/RHSA-2014-1398.html
http://rhn.redhat.com/errata/RHSA-2014-1399.html
http://rhn.redhat.com/errata/RHSA-2014-1400.html
http://secunia.com/advisories/59943
http://secunia.com/advisories/60419
http://secunia.com/advisories/61766
http://www.apache.org/dist/poi/release/RELEASE-NOTES.txt
http://www.securityfocus.com/bid/69648
http://www-01.ibm.com/support/docview.wss?uid=swg21996759
https://exchange.xforce.ibmcloud.com/vulnerabilities/95768
https://lucene.apache.org/solr/solrnews.html#18-august-2014-recommendation-to-update-apache-poi-in-apache-solr-480-481-and-490-installations
Related Vulnerabilities
CVE-2020-35451 Vulnerability in maven package org.apache.oozie:oozie-tools
CVE-2021-21380 Vulnerability in maven package org.xwiki.platform:xwiki-platform-ratings-api
CVE-2017-1000084 Vulnerability in maven package org.jenkins-ci.plugins:parameterized-trigger
CVE-2019-10170 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2012-3373 Vulnerability in maven package org.apache.wicket:wicket-request