CERTA-2003-AVI-006
Vulnerability from certfr_avis - Published: - Updated:
Il est possible d'utiliser la DTD (Data Type Definition) d'un document XML pour effectuer un déni de service local ou distant sur certaines applications utilisant un interpréteur XML.
Description
La DTD est la définition des structures et des balises utilisées dans un document XML.
L'interpréteur XML est utilisé dans la plupart des applications de développement de sites web, et sur de multiples serveurs HTTP.
Un utilisateur mal intentionné peut effectuer un déni de service localement ou à distance sur des applications JRun, ColdFusion et SunOne WebServer, au moyen d'une DTD habilement construite dans un document XML.
Solution
Consulter les bulletins de sécurité #23599 de Macromédia et #49922 de Sun (voir paragraphe Documentation) pour connaître les disponibilité des correctifs pour les applications affectées.
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | les applications Sun ONE Integration Server EAI Edition 3.0 et Unified Development Server 5.0. | ||
| N/A | N/A | Les applications utilisant JRun 4.0 ; | ||
| Adobe | ColdFusion | les applications ColdFusion MX (éditions Professional, Enterprise, J2EE jusqu'aux versions d'octobre 2002) ; |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "les applications Sun ONE Integration Server EAI Edition 3.0 et Unified Development Server 5.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Les applications utilisant JRun 4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "les applications ColdFusion MX (\u00e9ditions Professional, Enterprise, J2EE jusqu\u0027aux versions d\u0027octobre 2002) ;",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLa DTD est la d\u00e9finition des structures et des balises utilis\u00e9es dans un\ndocument XML.\n\nL\u0027interpr\u00e9teur XML est utilis\u00e9 dans la plupart des applications de\nd\u00e9veloppement de sites web, et sur de multiples serveurs HTTP.\n\nUn utilisateur mal intentionn\u00e9 peut effectuer un d\u00e9ni de service\nlocalement ou \u00e0 distance sur des applications JRun, ColdFusion et SunOne\nWebServer, au moyen d\u0027une DTD habilement construite dans un document\nXML.\n\n## Solution\n\nConsulter les bulletins de s\u00e9curit\u00e9 \\#23599 de Macrom\u00e9dia et \\#49922 de\nSun (voir paragraphe Documentation) pour conna\u00eetre les disponibilit\u00e9 des\ncorrectifs pour les applications affect\u00e9es.\n",
"cves": [],
"links": [
{
"title": "Bulletin d\u0027alerte #49922 de Sun :",
"url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F49922"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 #23599 de Macromedia :",
"url": "http://www.macromedia.com/v1/handlers/index.cfm?ID=23599"
}
],
"reference": "CERTA-2003-AVI-006",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Il est possible d\u0027utiliser la DTD (\u003cspan class=\"textit\"\u003eData Type\nDefinition\u003c/span\u003e) d\u0027un document XML pour effectuer un d\u00e9ni de service\nlocal ou distant sur certaines applications utilisant un interpr\u00e9teur\nXML.\n",
"title": "Vuln\u00e9rabilit\u00e9 des interpr\u00e9teurs XML sous de multiples syst\u00e8mes et applications",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 #49922 de Sun",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 #MPSB02-14",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.