Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1094620 - (CVE-2014-3243) CVE-2014-3243 SOAPpy: XML entity expansion (billion laughs) flaw
CVE-2014-3243 SOAPpy: XML entity expansion (billion laughs) flaw
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140422,repor...
: Security
Depends On: 1178862 1178863
Blocks: 1094623
  Show dependency treegraph
 
Reported: 2014-05-06 03:19 EDT by Murray McAllister
Modified: 2015-03-04 11:11 EST (History)
4 users (show)

See Also:
Fixed In Version: SOAPpy 0.12.6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Murray McAllister 2014-05-06 03:19:55 EDT
An entity expansion (billion laughs) flaw was found in SOAPpy. A remote attacker could send a specially-crafted request to an application that uses SOAPpy, leading to excessive CPU and memory consumption.

Original report: http://www.pnigos.com/?p=260

CVE request: http://seclists.org/oss-sec/2014/q2/249

Note that SOAPpy is not actively supported by upstream anymore.
Comment 1 Murray McAllister 2014-05-06 03:21:11 EDT
I've not filed a Fedora or EPEL bug for this (or for bug 1094619), as there is no patch yet from what I can see
Comment 2 Murray McAllister 2014-05-06 20:56:31 EDT
MITRE assigned CVE-2014-3243 to this issue:

http://www.openwall.com/lists/oss-security/2014/05/06/9
Comment 5 Tomas Hoger 2015-01-05 08:06:44 EST
This was fixed upstream in 0.12.6, via the following commit:

https://github.com/kiorky/SOAPpy/commit/64125a2

This commit introduces a dependency on the defusedxml module (the python-defusedxml package in Fedora).  It should be possible to create a smaller fix that e.g. disables entity expansion and DTD processing unconditionally.

It also only fixes this issue for the server, leaving SOAPpy clients exposed:

https://github.com/kiorky/SOAPpy/issues/17
Comment 6 Tomas Hoger 2015-01-05 10:01:42 EST
Created SOAPpy tracking bugs for this issue:

Affects: fedora-all [bug 1178862]
Affects: epel-5 [bug 1178863]

Note You need to log in before you can comment on or make changes to this bug.