Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 06 Mar 2013 11:25:13 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>,
        Mitre CVE assign department <cve-assign@...re.org>,
        Steven Christey <coley@...re.org>,
        Ruby Security Team <security@...y-lang.org>
Subject: CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/

=====

Unrestricted entity expansion can lead to a DoS vulnerability in
REXML. (The CVE identifier will be assigned later.) We strongly
recommend to upgrade ruby.
Details

When reading text nodes from an XML document, the REXML parser can be
coerced in to allocating extremely large string objects which can
consume all of the memory on a machine, causing a denial of service.

Impacted code will look something like this:

document = REXML::Document.new some_xml_doc
document.root.text

When the `text` method is called, entities will be expanded. An
attacker can send a relatively small XML document that, when the
entities are resolved, will consume extreme amounts of memory on the
target system.

Note that this attack is similar to, but different from the Billion
Laughs attack. This is also related to CVE-2013-1664 of Python.

All users running an affected release should either upgrade or use one
of the work arounds immediately.

=====

Please use CVE-2013-1821 for this issue. I apologize in advance if a
CVE was requested through other channels but we need a CVE for this
ASAP. Also for future reference you can get CVEs via

http://people.redhat.com/kseifrie/CVE-OpenSource-Request-HOWTO.html

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=7jHF
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.