A vulnerability has been reported in Apache Axis2/Java, which can be exploited by malicious people to disclose system information or potentially sensitive information and cause a DoS (Denial of Service).
The vulnerability is caused due to Axis2 not properly restricting the processing of XML Document Type Declarations (DTD). This can be exploited to e.g. determine the existence or include contents of local and potentially external files by including them as a DTD reference or cause a DoS due to CPU or memory consumption by providing e.g. a heavily nested DTD.
The vulnerability is reported in version 1.4.1 and 1.5.1. Prior versions may also be affected.
Solution: Apply patch and update to version 1.5.2 or 1.6 as soon as available. See vendor's advisory for additional details.
Provided and/or discovered by: Jan Freitag
Original Advisory: https://svn.apache.org/repos/asf/axis/axis2/java/core/security/CVE-2010-1632.pdf
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Apache Axis2/Java XML Document Type Declaration Processing Vulnerability
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.