CERTA-2003-AVI-215

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité présente sur les interpréteurs XML des serveurs WEB affectés permet à un utilisateur mal intentionné de réaliser un déni de service du système.

Description

Une vulnérabilité présente sur les interpréteurs XML des serveurs WEB utilisant SOAP permet à un utilisateur mal intentionné de réaliser un déni de service.

Par le biais d'une requête SOAP malicieusement construite, un utilisateur mal intentionné peut consommer toutes les ressources CPU du système et réaliser un déni de service.

Solution

Appliquer les correctifs disponibles (cf section documentation).

None
Impacted products
Vendor Product Description
N/A N/A Macromedia JRun 4.
Centreon Web Macromedia Coldfusion MX 6.0, 6.1 ;
IBM N/A IBM WebSphere 5.0.0, 5.0.1, 5.0.2, 5.0.2.1 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Macromedia JRun 4.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Macromedia Coldfusion MX 6.0, 6.1 ;",
      "product": {
        "name": "Web",
        "vendor": {
          "name": "Centreon",
          "scada": false
        }
      }
    },
    {
      "description": "IBM WebSphere 5.0.0, 5.0.1, 5.0.2, 5.0.2.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente sur les interpr\u00e9teurs XML des serveurs WEB\nutilisant SOAP permet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un\nd\u00e9ni de service.\n\nPar le biais d\u0027une requ\u00eate SOAP malicieusement construite, un\nutilisateur mal intentionn\u00e9 peut consommer toutes les ressources CPU du\nsyst\u00e8me et r\u00e9aliser un d\u00e9ni de service.\n\n## Solution\n\nAppliquer les correctifs disponibles (cf section documentation).\n",
  "cves": [],
  "links": [
    {
      "title": "Correctif de l\u0027interpr\u00e9teur XML de macrom\u00e9dia :",
      "url": "http://download.macromedia.com/pub/security/mpsb03-07.zip"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 sur la liste de diffusion BugTraq :",
      "url": "http://www.securityfocus.com/archive/1/346992"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 Macromedia :",
      "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb03-07.html"
    },
    {
      "title": "Correctif IBM Websphere de l\u0027interpr\u00e9teur XML :",
      "url": "ftp://ftp.software.ibm.com/software/websphere/appserv/support/fixes/PQ81278/"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 IBM :",
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026q=PQ81278\u0026uid=swg24005943"
    }
  ],
  "reference": "CERTA-2003-AVI-215",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2003-12-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente sur les interpr\u00e9teurs XML des serveurs WEB\naffect\u00e9s permet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un d\u00e9ni de\nservice du syst\u00e8me.\n",
  "title": "Vuln\u00e9rabilit\u00e9 des interpr\u00e9teurs XML de serveurs WEB (SOAP)",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Liste de diffusion BugTraq",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…