Red Hat Bugzilla – Bug 796015
CVE-2011-4967 tog-pegasus: xml hash table collision CPU usage DoS
Last modified: 2016-11-08 11:15:36 EST
Juraj Somorovsky reported that certain XML parsers/servers are affected by the
same, or similar, flaw as the hash table collisions CPU usage denial of
service. Sending a specially crafted message to an XML service can result in
longer processing time, which could lead to a denial of service. It is
reported that this attack on XML can be applied on different XML nodes (such as
entities, element attributes, namespaces, various elements in the XML security,
pegasus is written in C++ and contains an internal XML parser in XmlParser.cpp,
upstream was contacted.
This is being corrected in pegasus 2.12:
The patches are available at:
The final patch is 170k+ but it's mostly the test cases (the actual patch is just a few dozen lines).
The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.