Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1199103 - (CVE-2015-0252) CVE-2015-0252 xerces-c: crashes on malformed input
CVE-2015-0252 xerces-c: crashes on malformed input
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150320,repor...
: Security
Depends On: 1204021 1204018 1204019 1204020 1217104 1217105
Blocks: 1199109
  Show dependency treegraph
 
Reported: 2015-03-05 08:21 EST by Vasyl Kaigorodov
Modified: 2016-07-10 13:58 EDT (History)
34 users (show)

See Also:
Fixed In Version: xerces-c 3.1.2
Doc Type: Bug Fix
Doc Text:
A flaw was found in the way the Xerces-C XML parser processed certain XML documents. A remote attacker could provide specially crafted XML input that, when parsed by an application using Xerces-C, would cause that application to crash.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-06-30 03:21:35 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
XMLReader.cpp.patch (2.14 KB, text/plain)
2015-03-05 08:23 EST, Vasyl Kaigorodov
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:1193 normal SHIPPED_LIVE Moderate: xerces-c security update 2015-06-29 16:11:03 EDT

  None (edit)
Description Vasyl Kaigorodov 2015-03-05 08:21:33 EST
The Xerces-C XML parser mishandles certain kinds of malformed input documents, resulting in a segmentation fault during a parse operation. The bug does not appear to allow for remote code execution, but is a denial of service attack that in many applications may allow for an unauthenticated attacker to supply malformed input and cause a crash.

Suggested upstream patch is attached to this Bugzilla.
Comment 1 Vasyl Kaigorodov 2015-03-05 08:23:35 EST
Created attachment 998360 [details]
XMLReader.cpp.patch
Comment 2 Kurt Seifried 2015-03-20 00:06:34 EDT
This is now public: http://seclists.org/oss-sec/2015/q1/892
Comment 4 Tomas Hoger 2015-03-20 03:39:00 EDT
Created mingw-xerces-c tracking bugs for this issue:

Affects: fedora-all [bug 1204019]
Comment 5 Tomas Hoger 2015-03-20 03:39:04 EDT
Created xerces-c tracking bugs for this issue:

Affects: fedora-all [bug 1204018]
Affects: epel-6 [bug 1204021]
Comment 6 Tomas Hoger 2015-03-20 03:39:08 EDT
Created xerces-c27 tracking bugs for this issue:

Affects: fedora-all [bug 1204020]
Comment 7 Fedora Update System 2015-03-26 17:30:19 EDT
xerces-c-3.1.2-1.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2015-03-26 17:49:21 EDT
mingw-xerces-c-3.1.2-1.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2015-03-30 03:00:12 EDT
xerces-c-3.1.1-8.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Fedora Update System 2015-03-30 03:08:08 EDT
mingw-xerces-c-3.1.1-9.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 11 Fedora Update System 2015-03-30 03:09:50 EDT
mingw-xerces-c-3.1.1-11.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 12 Fedora Update System 2015-03-30 03:10:58 EDT
xerces-c-3.1.1-6.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 15 Jarno Huuskonen 2015-04-13 02:23:48 EDT
Does CVE-2015-0252 affect xerces-c-3.1.1-6.el7.x86_64 that comes with "Red Hat Enterprise Linux Server release 7.1 (Maipo)" ?

On RHEL7 shibboleth sp (http://shibboleth.net/products/service-provider.html) uses xerces-c. Fix for CVE-2015-0252 is important because shibboleth sp has DoS vulnerability: https://shibboleth.net/community/advisories/secadv_20150319.txt
Comment 16 Ján Rusnačko 2015-04-14 04:10:22 EDT
(In reply to Jarno Huuskonen from comment #15)
> Does CVE-2015-0252 affect xerces-c-3.1.1-6.el7.x86_64 that comes with "Red
> Hat Enterprise Linux Server release 7.1 (Maipo)" ?
> 
> On RHEL7 shibboleth sp
> (http://shibboleth.net/products/service-provider.html) uses xerces-c. Fix
> for CVE-2015-0252 is important because shibboleth sp has DoS vulnerability:
> https://shibboleth.net/community/advisories/secadv_20150319.txt

Upstream states versions prior to 3.1.2 are affected, and RHEL 7.1 version is affected, too.
Comment 20 Scott Cantor 2015-05-14 13:07:50 EDT
Is there any kind of timeline on this? My community is left hanging, and it's been an unacceptably long period of time to leave a bug this serious unpatched.

I did a lot of work to get this fix out there from upstream, when that project was essentially dead, and this isn't really making me feel like it was worth my time.
Comment 21 errata-xmlrpc 2015-06-29 12:12:24 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:1193 https://rhn.redhat.com/errata/RHSA-2015-1193.html
Comment 23 Ján Rusnačko 2015-06-30 03:31:24 EDT
Hello Scott,

I apologize for the delay - this has been handled unusually long. This issue has been stalled three times in various stages of our process due to extraordinary complications. I am going to do a postmortem now and make sure these are documented and addressed in the future.

Thank you !
Comment 24 Scott Cantor 2015-06-30 09:48:12 EDT
Thank you for getting the fix out, and for responding. I'm glad that at least this wasn't a routine situation.

Note You need to log in before you can comment on or make changes to this bug.