Re: Multiple Vendor SOAP server (XML parser) attribute blowup DoS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

this seems to be somehow related (at least the Java DoSes) to

"Large number of entity expansions cause 100 % CPU resulting in DoS
condition."

(http://developer.java.sun.com/developer/bugParade/bugs/4791146.html)

This bug is public since 12/2002, and fixed in JDK 1.4.1_03 according
to Sun.

Marc


On Tue, 9 Dec 2003, Amit Klein wrote:

> Date: Tue, 09 Dec 2003 18:48:48 +0200
> From: Amit Klein <Amit.Klein@SanctumInc.com>
> To: bugtraq@securityfocus.com, news@securiteam.com
> Subject: Multiple Vendor SOAP server (XML parser) attribute blowup DoS
>
> ///////////////////////////////////////////////////////////////////////////////
> //==========================>> Security Advisory
> <<==========================//
> ///////////////////////////////////////////////////////////////////////////////
>
> --------------------------------------------------------------------------------
> -----[ Multiple Vendor SOAP server (XML parser) attribute blowup DoS
> --------------------------------------------------------------------------------
>
> --[ Author: Amit Klein, Sanctum inc. http://www.SanctumInc.com
>
> --[ Vendors alerted: August 28th, 2003
>
> --[ Release Date: December 9th, 2003
>
> --[ Products:
>
> IBM WebSphere 5.0.0, 5.0.1, 5.0.2, 5.0.2.1
>
> Microsoft ASP.NET Web Services (.NET framework 1.0, .NET framework 1.1)
>
> Macromedia ColdFusion MX 6.0, 6.1
>
> Macromedia JRun 4
>
> ... And probably other products which use XML parsers
>
> --[ Severity: High
>
> --[ CVE: N/A
>
> --[ Description
>
> An attacker can craft a malicious SOAP request, which uses XML
> attributes in a way that
> inflicts a denial of service condition on the target machine (SOAP server).
> The result of this attack is that the XML parser consumes all the CPU
> resources
> for a long period of time (from seconds to minutes, depending on the
> size of the payload).
> In our experiments, we were able to send attacks (of few hunderd KBs)
> that caused the target
> machines to consume 100% CPU for several minutes.
>
> --[ Solution
>
> IBM WebSphere - Download and apply IBM patch PQ81278 from the following URL:
> http://www-1.ibm.com/support/docview.wss?rs=180&context=SSEQTP&q=PQ81278&uid=swg24005943
>
> Microsoft ASP.NET Web Services - Microsoft is aware of the issue, and
> has documented
> recommended practices for what customers should consider when exposing
> Web service endpoints
> in Knowledge Base Article 832878
> (http://support.microsoft.com/default.aspx?kbid=832878)
>
> Macromedia - please follow the instructions of MPSB03-07, in the
> following URL:
> http://www.macromedia.com/devnet/security/security_zone/mpsb03-07.html
>
>
>
>

--

Never be afraid to try something new. Remember, amateurs built the
ark; professionals built the Titanic. -- Anonymous

Marc Schönefeld Dipl. Wirtsch.-Inf. / Software Developer



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux