CVE-2014-8090

Related Vulnerabilities: CVE-2014-8090  

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

The MITRE CVE dictionary describes this issue as:

The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.

Find out more about CVE-2014-8090 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/

Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 (ruby200-ruby) RHSA-2014:1914 2014-11-26
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 (ruby193-ruby) RHSA-2014:1913 2014-11-26
Red Hat Enterprise Linux 6 (ruby) RHSA-2014:1911 2014-11-26
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 (ruby200-ruby) RHSA-2014:1914 2014-11-26
Red Hat Enterprise Linux 7 (ruby) RHSA-2014:1912 2014-11-26
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 (ruby193-ruby) RHSA-2014:1913 2014-11-26

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 ruby193-ruby Will not fix
Red Hat Satellite 6 rubygem-rake Will not fix
Red Hat OpenShift Enterprise 1 ruby193-ruby Will not fix
Red Hat JBoss Enterprise SOA Platform 5 jruby Will not fix
Red Hat JBoss Enterprise SOA Platform 4.3 jruby Will not fix
Red Hat Enterprise Linux OpenStack Platform 4.0 ruby193-ruby Will not fix
Red Hat Enterprise Linux 5 ruby Fix deferred
Red Hat Enterprise Linux 4 ruby Will not fix

Acknowledgements

This issue was discovered by Red Hat Product Security.

External References