[ 
https://issues.apache.org/jira/browse/XERCESJ-1748?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17574431#comment-17574431
 ] 

Albert Wang edited comment on XERCESJ-1748 at 8/3/22 12:05 AM:
---------------------------------------------------------------

Hi [~ggregory], more information about the issue.

Here is a [SNYK security 
ticket|https://security.snyk.io/vuln/SNYK-JAVA-XERCES-31497]. The ticket 
mentions that the issue has been resolved by patch 2.11.0.

Based on a 
[comment|https://github.com/jeremylong/DependencyCheck/issues/4614#issuecomment-1203233304]
 on Github, the issue was not resolved within Xerces itself (still fully 
relying on Java defaults to provide sensible timeouts), but it's only resolved 
because the JDK has built in a default timeout for FTP connections in response 
to the CVE, so that over time the connections will time out and release the 
hanging thread with a timeout exception.
In [Hans Aikema|https://github.com/aikebah]'s view, this default timeout is 
still large enough to warrant the OSSINDEX security team to keep the issue for 
Xerces open (with a 300k millisec timeout an attacker may well be capable of 
triggering at least a significant service degradation).

Thank you.

Regards,
Albert


was (Author: JIRAUSER293781):
Hi [~ggregory], more information about the issue.

Here is a [SNYK security 
ticket|[https://security.snyk.io/vuln/SNYK-JAVA-XERCES-31497]. The ticket 
mentions that the issue has been resolved by patch 2.11.0.

Based on a 
[comment|https://github.com/jeremylong/DependencyCheck/issues/4614#issuecomment-1203233304]
 on Github, the issue was not resolved within Xerces itself (still fully 
relying on Java defaults to provide sensible timeouts), but it's only resolved 
because the JDK has built in a default timeout for FTP connections in response 
to the CVE, so that over time the connections will time out and release the 
hanging thread with a timeout exception.
In [Hans Aikema|https://github.com/aikebah]'s view, this default timeout is 
still large enough to warrant the OSSINDEX security team to keep the issue for 
Xerces open (with a 300k millisec timeout an attacker may well be capable of 
triggering at least a significant service degradation).

Thank you.

Regards,
Albert

> sonatype-2017-0348 - xerces:xercesImpl - Denial of Service (DoS)
> ----------------------------------------------------------------
>
>                 Key: XERCESJ-1748
>                 URL: https://issues.apache.org/jira/browse/XERCESJ-1748
>             Project: Xerces2-J
>          Issue Type: Bug
>            Reporter: Albert Wang
>            Priority: Major
>
> OSSIndex published a vulnerability in xercesImpl:xerces:2.12.2.
>  
> _*[[sonatype-2017-0348] CWE-833: 
> Deadlock|https://ossindex.sonatype.org/vulnerability/sonatype-2017-0348]*_
> _Description_
> _sonatype-2017-0348 - xerces:xercesImpl - Denial of Service (DoS)_
> _The software contains multiple threads or executable segments that are 
> waiting for each other to release a necessary lock, resulting in deadlock._



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: j-dev-unsubscr...@xerces.apache.org
For additional commands, e-mail: j-dev-h...@xerces.apache.org

Reply via email to