{
  "threat_severity" : "Low",
  "public_date" : "2011-05-31T00:00:00Z",
  "bugzilla" : {
    "description" : "jabberd: DoS via the XML \"billion laughs attack\"",
    "id" : "700390",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=700390"
  },
  "cvss" : {
    "cvss_base_score" : "5.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "status" : "verified"
  },
  "details" : [ "jabberd2 before 2.2.14 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564." ],
  "statement" : "Vulnerable. This issue has been addressed in Red Hat Network Satellite Server v 5.4.1 via RHSA-2011:0882 https://rhn.redhat.com/errata/RHSA-2011-0882.html and in Red Hat Network Proxy Server v5.4.1 via RHSA-2011:0881 https://rhn.redhat.com/errata/RHSA-2011-0881.html. This issue is not planned\nto be fixed in Red Hat Network Satellite Server versions 5.0.2, 5.1.1, 5.2.1, 5.3.0 and not planned to be fixed in Red Hat Network Proxy Server versions 5.0.2, 5.1.1, 5.2.1, and 5.3.0.",
  "affected_release" : [ {
    "product_name" : "Red Hat Network Proxy v 5.4",
    "release_date" : "2011-06-16T00:00:00Z",
    "advisory" : "RHSA-2011:0881",
    "cpe" : "cpe:/a:redhat:network_proxy:5.4::el5",
    "package" : "jabberd-0:2.2.8-12.el5sat"
  }, {
    "product_name" : "Red Hat Network Satellite Server v 5.4",
    "release_date" : "2011-06-16T00:00:00Z",
    "advisory" : "RHSA-2011:0882",
    "cpe" : "cpe:/a:redhat:network_satellite:5.4::el5",
    "package" : "jabberd-0:2.2.8-12.el5sat"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-1755\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-1755" ],
  "name" : "CVE-2011-1755",
  "csaw" : false
}