CERTA-2003-AVI-215
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité présente sur les interpréteurs XML des serveurs WEB affectés permet à un utilisateur mal intentionné de réaliser un déni de service du système.
Description
Une vulnérabilité présente sur les interpréteurs XML des serveurs WEB utilisant SOAP permet à un utilisateur mal intentionné de réaliser un déni de service.
Par le biais d'une requête SOAP malicieusement construite, un utilisateur mal intentionné peut consommer toutes les ressources CPU du système et réaliser un déni de service.
Solution
Appliquer les correctifs disponibles (cf section documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Macromedia JRun 4.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Macromedia Coldfusion MX 6.0, 6.1 ;",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "IBM WebSphere 5.0.0, 5.0.1, 5.0.2, 5.0.2.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente sur les interpr\u00e9teurs XML des serveurs WEB\nutilisant SOAP permet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un\nd\u00e9ni de service.\n\nPar le biais d\u0027une requ\u00eate SOAP malicieusement construite, un\nutilisateur mal intentionn\u00e9 peut consommer toutes les ressources CPU du\nsyst\u00e8me et r\u00e9aliser un d\u00e9ni de service.\n\n## Solution\n\nAppliquer les correctifs disponibles (cf section documentation).\n",
"cves": [],
"links": [
{
"title": "Correctif de l\u0027interpr\u00e9teur XML de macrom\u00e9dia :",
"url": "http://download.macromedia.com/pub/security/mpsb03-07.zip"
},
{
"title": "Avis de s\u00e9curit\u00e9 sur la liste de diffusion BugTraq :",
"url": "http://www.securityfocus.com/archive/1/346992"
},
{
"title": "Avis de s\u00e9curit\u00e9 Macromedia :",
"url": "http://www.macromedia.com/devnet/security/security_zone/mpsb03-07.html"
},
{
"title": "Correctif IBM Websphere de l\u0027interpr\u00e9teur XML :",
"url": "ftp://ftp.software.ibm.com/software/websphere/appserv/support/fixes/PQ81278/"
},
{
"title": "Avis de s\u00e9curit\u00e9 IBM :",
"url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026q=PQ81278\u0026uid=swg24005943"
}
],
"reference": "CERTA-2003-AVI-215",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-12-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente sur les interpr\u00e9teurs XML des serveurs WEB\naffect\u00e9s permet \u00e0 un utilisateur mal intentionn\u00e9 de r\u00e9aliser un d\u00e9ni de\nservice du syst\u00e8me.\n",
"title": "Vuln\u00e9rabilit\u00e9 des interpr\u00e9teurs XML de serveurs WEB (SOAP)",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste de diffusion BugTraq",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…