An entity expansion (billion laughs) flaw was found in SOAPpy. A remote attacker could send a specially-crafted request to an application that uses SOAPpy, leading to excessive CPU and memory consumption.
Original report: http://www.pnigos.com/?p=260
CVE request: http://seclists.org/oss-sec/2014/q2/249
Note that SOAPpy is not actively supported by upstream anymore.
I've not filed a Fedora or EPEL bug for this (or for bug 1094619), as there is no patch yet from what I can see
MITRE assigned CVE-2014-3243 to this issue:
This was fixed upstream in 0.12.6, via the following commit:
This commit introduces a dependency on the defusedxml module (the python-defusedxml package in Fedora). It should be possible to create a smaller fix that e.g. disables entity expansion and DTD processing unconditionally.
It also only fixes this issue for the server, leaving SOAPpy clients exposed:
Created SOAPpy tracking bugs for this issue:
Affects: fedora-all [bug 1178862]
Affects: epel-5 [bug 1178863]