Red Hat Bugzilla – Bug 796015
CVE-2011-4967 tog-pegasus: xml hash table collision CPU usage DoS
Last modified: 2016-11-08 11:15:36 EST
Juraj Somorovsky reported that certain XML parsers/servers are affected by the same, or similar, flaw as the hash table collisions CPU usage denial of service. Sending a specially crafted message to an XML service can result in longer processing time, which could lead to a denial of service. It is reported that this attack on XML can be applied on different XML nodes (such as entities, element attributes, namespaces, various elements in the XML security, etc.). pegasus is written in C++ and contains an internal XML parser in XmlParser.cpp, upstream was contacted.
This is being corrected in pegasus 2.12: http://bugzilla.openpegasus.org/show_bug.cgi?id=9182 The patches are available at: http://bugzilla.openpegasus.org/show_bug.cgi?id=9374 The final patch is 170k+ but it's mostly the test cases (the actual patch is just a few dozen lines).
Statement: The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.