This is an automated email from the ASF dual-hosted git repository. borisk pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/xerces-c.git
commit a932e78720b350d2f46f1e8d7a948b419952b3bb Author: Scott Cantor <scan...@apache.org> AuthorDate: Mon Dec 16 23:05:51 2019 +0000 Add CVE-2018-1311 advisory and web site note. git-svn-id: https://svn.apache.org/repos/asf/xerces/c/trunk@1871683 13f79535-47bb-0310-9956-ffa450edef68 --- doc/html/secadv/CVE-2018-1311.txt | 49 +++++++++++++++++++++++++++++++++++++++ doc/secadv.xml | 11 +++++++++ 2 files changed, 60 insertions(+) diff --git a/doc/html/secadv/CVE-2018-1311.txt b/doc/html/secadv/CVE-2018-1311.txt new file mode 100644 index 0000000..01d384f --- /dev/null +++ b/doc/html/secadv/CVE-2018-1311.txt @@ -0,0 +1,49 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +CVE-2018-1311: Apache Xerces-C use-after-free vulnerability processing external DTD + +Severity: High + +Vendor: The Apache Software Foundation + +Versions Affected: Apache Xerces-C XML Parser library (all known versions) + +Description: The Xerces-C XML parser contains a use-after-free error +triggered during the scanning of external DTDs. + +The bug allows for a denial of service attack in applications that allow +external DTD processing and do not prevent external DTD usage, and could +conceivably result in remote code execution if the heap were groomed. + +Mitigation: This flaw has not been addressed in the maintained version +of the library and has no current mitigation other than to disable DTD +processing. This can be accomplished via the DOM using a standard parser +feature, or via SAX using the XERCES_DISABLE_DTD environment variable. + +Applications should strongly consider blocking remote entity resolution +and/or disabling of DTD processing in light of the continued +identification of bugs in this area of the library. + +Credit: This issue was reported by the UK's National Cyber Security +Centre (NCSC). + +References: +http://xerces.apache.org/xerces-c/secadv/CVE-2018-1311.txt + +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE3KoVAHvtneaQzZUjN4uEVAIneWIFAl34DFIACgkQN4uEVAIn +eWIbtQ/9Gv7gURR24J5yx+R69O4bnGsgHPaHea7VWh4bs4H/mYli3ewZBwzkuTz1 ++Ib6RN8QXT9FA4+TVBCQua2/EBlpnpNMHPp6+GDWISrPYworJGV9FDrCDfqB+BR2 +Li68pH/wlFgqCLMsdUSm7lKU9n+rflW8kx3AsqBlggcrfGTh7XJaImHelOXuRqw/ +QumnckDQQkEgPHxGVE5h2uYvwj1HsyU/czqqWVAHC1rzdXI9syGGOO9xoNCjB70d +rMi+XEDTuyzqY6SIjM1NLbFyX8cs9CDM4IhQeG+XNQUE9VnvLu1dHY/IqvS9jDrO +HD4J0ID/rnbxSou3BTaMKGr/TkJHanniZhXJxZujDI7ksEbMBemB7ROwCcQLQ8Z8 +B3QKfCQwjIGmBMaDafElyrbIp74+Vpq3eY6itFOGCQE7f+rXu3qxEk5njsdBsJYV +s47v9f0v65O0FE5l7yPi3zhkonCfHaMTw08SboY2YqWJf9A1YJZOs1PF1SNU+D/p +rM2ydwP5F9OPlwm/uLCfRd+hl2etM0UJBcL1V/tP0ORoEZUF1+ZEZckDQ9Cnr2eY +6Dgd+dmTk5nxjPmsQZPHb4QXsQHbq1HCU5/oJug56SatJ0H0ffj48XXjd1UlBEIk +v5Eo3+ahPxXBuSgc77naLcisSy3H3+qL6VDMpq6qK1IC/PXvaz0= +=zDeT +-----END PGP SIGNATURE----- diff --git a/doc/secadv.xml b/doc/secadv.xml index 4184697..54dda5d 100644 --- a/doc/secadv.xml +++ b/doc/secadv.xml @@ -20,6 +20,17 @@ <s1 title="Security Advisories"> +<s2 title="Unaddressed Advisories"> + +<p>The following security advisories apply to current versions of +Xerces-C and have not been fixed, in most cases due to insufficient +expertise or resources:</p> + +<ul> + <li><jump href="secadv/CVE-2018-1311.txt">CVE-2018-1311: Apache Xerces-C use-after-free vulnerability scanning external DTD</jump></li> +</ul> +</s2> + <s2 title="Addressed in 3.2.1 and Later Releases"> <p>The following security advisories apply to versions of Xerces-C older than V3.2.1:</p> --------------------------------------------------------------------- To unsubscribe, e-mail: c-dev-unsubscr...@xerces.apache.org For additional commands, e-mail: c-dev-h...@xerces.apache.org