tog-pegasus xml hash table collision CPU usage DoS

2012.12.14
Risk: High
Local: No
Remote: Yes
CWE: CWE-20


CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

Juraj Somorovsky reported that certain XML parsers/servers are affected by the same, or similar, flaw as the hash table collisions CPU usage denial of service. Sending a specially crafted message to an XML service can result in longer processing time, which could lead to a denial of service. It is reported that this attack on XML can be applied on different XML nodes (such as entities, element attributes, namespaces, various elements in the XML security, etc.). pegasus is written in C++ and contains an internal XML parser in XmlParser.cpp, upstream was contacted. This is being corrected in pegasus 2.12: http://bugzilla.openpegasus.org/show_bug.cgi?id=9182 The patches are available at: http://bugzilla.openpegasus.org/show_bug.cgi?id=9374 The final patch is 170k+ but it's mostly the test cases (the actual patch is just a few dozen lines).

References:

http://bugzilla.openpegasus.org/show_bug.cgi?id=9182
http://bugzilla.openpegasus.org/show_bug.cgi?id=9374
http://seclists.org/oss-sec/2012/q4/468


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top