CVE-2022-23437: Infinite loop within Apache XercesJ xml parser

Related Vulnerabilities: CVE-2022-23437  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2022-23437: Infinite loop within Apache XercesJ xml parser

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Mukul Gandhi &lt;mukulg () apache org&gt;

Date: Mon, 24 Jan 2022 18:42:01 +0530

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
To: oss-security () lists openwall com
Reply-To: j-dev () xerces apache org
Subject: CVE-2022-23437: Infinite loop within Apache XercesJ xml parser

Severity: high

Description:

There's a vulnerability within the Apache Xerces Java (XercesJ) XML
parser when handling specially crafted XML document payloads. This
causes, the XercesJ XML parser to wait in an infinite loop, which may
sometimes consume system resources for prolonged duration. This
vulnerability is present within XercesJ version 2.12.1 and the
previous versions.

Mitigation:

Apache XercesJ users, should migrate to version 2.12.2

Credit:

This issue was discovered by Sergey Temnikov and Ziyi Luo, from Amazon
Corretto/JDK Team

References:
https://markmail.org/message/vcmhwbuorfgcdr6l

-- 
Regards,
Mukul Gandhi

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2022-23437: Infinite loop within Apache XercesJ xml parser Mukul Gandhi (Jan 24)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->