An entity expansion (billion laughs) flaw was found in SOAPpy. A remote attacker could send a specially-crafted request to an application that uses SOAPpy, leading to excessive CPU and memory consumption. Original report: http://www.pnigos.com/?p=260 CVE request: http://seclists.org/oss-sec/2014/q2/249 Note that SOAPpy is not actively supported by upstream anymore.
I've not filed a Fedora or EPEL bug for this (or for bug 1094619), as there is no patch yet from what I can see
MITRE assigned CVE-2014-3243 to this issue: http://www.openwall.com/lists/oss-security/2014/05/06/9
This was fixed upstream in 0.12.6, via the following commit: https://github.com/kiorky/SOAPpy/commit/64125a2 This commit introduces a dependency on the defusedxml module (the python-defusedxml package in Fedora). It should be possible to create a smaller fix that e.g. disables entity expansion and DTD processing unconditionally. It also only fixes this issue for the server, leaving SOAPpy clients exposed: https://github.com/kiorky/SOAPpy/issues/17
Created SOAPpy tracking bugs for this issue: Affects: fedora-all [bug 1178862] Affects: epel-5 [bug 1178863]