An unspecified vulnerability in the XML component was fixed in IBM JDK 7 SR6, 6 SR15 and 5.0 SR16-FP4. This issue got the following CVSSv2 score upstream: 4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P https://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_November_2013 https://www.ibm.com/developerworks/java/jdk/aix/j732/Java7.fixes.html#SR6 https://www.ibm.com/developerworks/java/jdk/aix/j632/Java6.fixes.html#SR15 https://www.ibm.com/developerworks/java/jdk/aix/j532/fixes.html#SR16FP4 Additional details may become available under this X-Force database article: http://xforce.iss.net/xforce/xfdb/86662
Some additional details are provided by the IBM WebSphere Message Broker and IBM Integration Bus security bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21653087 The XML4J parser (...) is vulnerable to a denial of service attack, triggered by a specially crafted XML document. The specially crafted XML document causes the XML parser to run out of memory when the security feature to control the processing of a document with a large number of entities that need to be expanded is enabled.
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 6 Supplementary for Red Hat Enterprise Linux 5 Via RHSA-2013:1509 https://rhn.redhat.com/errata/RHSA-2013-1509.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:1508 https://rhn.redhat.com/errata/RHSA-2013-1508.html
This issue has been addressed in following products: Supplementary for Red Hat Enterprise Linux 5 Supplementary for Red Hat Enterprise Linux 6 Via RHSA-2013:1507 https://rhn.redhat.com/errata/RHSA-2013-1507.html
This issue has been addressed in following products: Red Hat Network Satellite Server v 5.4 Red Hat Network Satellite Server v 5.5 Red Hat Satellite Server v 5.6 Via RHSA-2013:1793 https://rhn.redhat.com/errata/RHSA-2013-1793.html