Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47072: CWE-121: Stack-based Buffer Overflow in x-stream xstream

0
High
VulnerabilityCVE-2024-47072cvecve-2024-47072cwe-121cwe-502
Published: Thu Nov 07 2024 (11/07/2024, 23:38:52 UTC)
Source: CVE Database V5
Vendor/Project: x-stream
Product: xstream

Description

XStream is a simple library to serialize objects to XML and back again. This vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream when XStream is configured to use the BinaryStreamDriver. XStream 1.4.21 has been patched to detect the manipulation in the binary input stream causing the the stack overflow and raises an InputManipulationException instead. Users are advised to upgrade. Users unable to upgrade may catch the StackOverflowError in the client code calling XStream if XStream is configured to use the BinaryStreamDriver.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:47:17 UTC

Technical Analysis

XStream is a Java library designed for serializing objects to XML and deserializing XML back into objects. The vulnerability identified as CVE-2024-47072 is a stack-based buffer overflow (CWE-121) that occurs specifically when XStream is configured to use the BinaryStreamDriver for processing binary XML input streams. An attacker can craft malicious binary input that causes the stack to overflow during deserialization, leading to an application crash and denial of service (DoS). This vulnerability does not allow code execution or data corruption but disrupts service availability. The flaw arises from insufficient input validation and improper handling of binary stream data, which leads to uncontrolled recursion or buffer writes on the stack. XStream version 1.4.21 includes a patch that detects manipulation attempts in the binary input stream and raises an InputManipulationException, preventing the stack overflow. For users unable to upgrade immediately, it is recommended to catch StackOverflowError exceptions in the client code to mitigate crashes. The vulnerability has a CVSS v3.1 score of 7.5, reflecting its high impact on availability with no required privileges or user interaction and remote network attack vector. No public exploits have been reported yet, but the ease of triggering a DoS through crafted input makes it a significant threat for applications relying on vulnerable XStream versions.

Potential Impact

The primary impact of CVE-2024-47072 is denial of service through application crashes caused by stack overflow during deserialization of manipulated binary XML streams. For European organizations, especially those using Java-based applications that incorporate XStream for XML processing, this can lead to service interruptions, degraded user experience, and potential operational downtime. Critical systems that rely on continuous availability, such as financial services, healthcare, and government platforms, may face disruptions if exposed to malicious input streams. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can indirectly affect business continuity and trust. Additionally, organizations with automated systems processing untrusted or external XML data streams are at higher risk. The absence of known exploits currently reduces immediate threat but does not eliminate the risk of future exploitation. Failure to patch or mitigate could result in targeted DoS attacks, especially in sectors with high reliance on Java serialization frameworks.

Mitigation Recommendations

1. Upgrade all instances of XStream to version 1.4.21 or later, which includes the fix to detect and prevent stack overflow caused by manipulated binary input streams. 2. For environments where immediate upgrade is not possible, implement robust exception handling to catch StackOverflowError in the client code that invokes XStream with BinaryStreamDriver configuration, preventing application crashes. 3. Restrict or validate all incoming binary XML streams rigorously to ensure they originate from trusted sources and conform to expected schemas, reducing the risk of malicious input. 4. Employ runtime application self-protection (RASP) or similar monitoring tools to detect abnormal deserialization behavior or repeated crashes indicative of exploitation attempts. 5. Conduct code reviews and penetration testing focused on deserialization components to identify and remediate similar vulnerabilities. 6. Maintain up-to-date inventory of software dependencies and monitor for security advisories related to serialization libraries. 7. Implement network-level protections such as Web Application Firewalls (WAFs) with custom rules to detect and block suspicious binary XML payloads targeting deserialization endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2024-09-17T17:42:37.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092b7735043901e828cb4f

Added to database: 11/3/2025, 10:23:51 PM

Last enriched: 11/3/2025, 10:47:17 PM

Last updated: 11/4/2025, 5:14:15 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats