<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2022-23437: Infinite loop within Apache XercesJ xml parser
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Mukul Gandhi <mukulg () apache org>
Date: Mon, 24 Jan 2022 18:42:01 +0530
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
To: oss-security () lists openwall com
Reply-To: j-dev () xerces apache org
Subject: CVE-2022-23437: Infinite loop within Apache XercesJ xml parser
Severity: high
Description:
There's a vulnerability within the Apache Xerces Java (XercesJ) XML
parser when handling specially crafted XML document payloads. This
causes, the XercesJ XML parser to wait in an infinite loop, which may
sometimes consume system resources for prolonged duration. This
vulnerability is present within XercesJ version 2.12.1 and the
previous versions.
Mitigation:
Apache XercesJ users, should migrate to version 2.12.2
Credit:
This issue was discovered by Sergey Temnikov and Ziyi Luo, from Amazon
Corretto/JDK Team
References:
https://markmail.org/message/vcmhwbuorfgcdr6l
--
Regards,
Mukul Gandhi
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2022-23437: Infinite loop within Apache XercesJ xml parser Mukul Gandhi (Jan 24)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->