Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1151364 - (CVE-2014-6517) CVE-2014-6517 OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533)
CVE-2014-6517 OpenJDK: StAX parser parameter entity XXE (JAXP, 8039533)
Status: CLOSED CURRENTRELEASE
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20141014,repor...
: Security
Depends On:
Blocks: 1148726 1167418
  Show dependency treegraph
 
Reported: 2014-10-10 04:47 EDT by Tomas Hoger
Modified: 2016-04-26 04:10 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-09-02 21:24:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1620 normal SHIPPED_LIVE Important: java-1.7.0-openjdk security and bug fix update 2014-10-15 01:26:31 EDT
Red Hat Product Errata RHSA-2014:1633 normal SHIPPED_LIVE Important: java-1.7.0-openjdk security and bug fix update 2014-10-14 20:47:46 EDT
Red Hat Product Errata RHSA-2014:1634 normal SHIPPED_LIVE Important: java-1.6.0-openjdk security and bug fix update 2014-10-15 02:09:01 EDT
Red Hat Product Errata RHSA-2014:1636 normal SHIPPED_LIVE Important: java-1.8.0-openjdk security update 2014-10-15 03:03:25 EDT
Red Hat Product Errata RHSA-2014:1657 normal SHIPPED_LIVE Critical: java-1.7.0-oracle security update 2017-12-15 10:36:32 EST
Red Hat Product Errata RHSA-2014:1658 normal SHIPPED_LIVE Important: java-1.6.0-sun security update 2017-12-15 10:35:40 EST

  None (edit)
Description Tomas Hoger 2014-10-10 04:47:47 EDT
It was discovered that the StAX XML parser in the JAXP (Java API for XML Processing) component of OpenJDK failed to properly honor setting indicating (defined using isSupportingExternalEntities / IS_SUPPORTING_EXTERNAL_ENTITIES property) whether external XML entities should be processed.  External parameter entities were processed even when the StAX parser was configured to not process external entities.  An attacker able to provide a specially-crafted XML file to an application using StAX parser could use this flaw to perform XML eXternal Entity (XXE) attack.
Comment 1 Tomas Hoger 2014-10-14 16:13:13 EDT
Public now via Oracle Critical Patch Update - October 2014.  Fixed in Oracle Java SE 6u85, 7u71, and 8u25.

External References:

http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html#AppendixJAVA
Comment 2 errata-xmlrpc 2014-10-14 16:48:21 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:1633 https://rhn.redhat.com/errata/RHSA-2014-1633.html
Comment 3 errata-xmlrpc 2014-10-14 21:27:17 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2014:1620 https://rhn.redhat.com/errata/RHSA-2014-1620.html
Comment 4 errata-xmlrpc 2014-10-14 22:09:49 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 5

Via RHSA-2014:1634 https://rhn.redhat.com/errata/RHSA-2014-1634.html
Comment 5 errata-xmlrpc 2014-10-14 23:03:41 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1636 https://rhn.redhat.com/errata/RHSA-2014-1636.html
Comment 6 Martin Prpič 2014-10-15 05:36:34 EDT
IssueDescription:

It was discovered that the StAX XML parser in the JAXP component in OpenJDK performed expansion of external parameter entities even when external entity substitution was disabled. A remote attacker could use this flaw to perform XML eXternal Entity (XXE) attack against applications using the StAX parser to parse untrusted XML documents.
Comment 8 errata-xmlrpc 2014-10-16 19:02:36 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7
  Oracle Java for Red Hat Enterprise Linux 6
  Oracle Java for Red Hat Enterprise Linux 5

Via RHSA-2014:1658 https://rhn.redhat.com/errata/RHSA-2014-1658.html
Comment 9 errata-xmlrpc 2014-10-16 19:12:53 EDT
This issue has been addressed in the following products:

  Oracle Java for Red Hat Enterprise Linux 7
  Oracle Java for Red Hat Enterprise Linux 6
  Oracle Java for Red Hat Enterprise Linux 5

Via RHSA-2014:1657 https://rhn.redhat.com/errata/RHSA-2014-1657.html

Note You need to log in before you can comment on or make changes to this bug.