SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Macromedia JRun Vendors:   Macromedia
Macromedia JRun Server Bug In Parsing XML DTDs May Let Remote Users Crash the Server
SecurityTracker Alert ID:  1005805
SecurityTracker URL:  http://securitytracker.com/id/1005805
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 13 2002
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.0
Description:   A denial of service vulnerability was reported in Macromedia's JRun server. A remote user can cause the server to consume all available CPU resources.

It is reported that if the server's SOAP interfaces are presented with a malformed XML message, the XML parser (either Crimson or Xerces) may enter a processing loop that will exhaust CPU resources.

A similar vulnerability [or potentially the same vulnerability] was recently reported in BEA's WebLogic. In that report [also credited to Sanctum, Inc.] it was reported that a remote user could create specially crafted entity references in an XML Document Type Definition (DTD) to cause the Xerces parser to consume all available processing resources and crash.

Macromedia credits Sanctum, Inc. with reporting this flaw.

Impact:   A remote user may be able to cause the service to consume all available resources and crash.
Solution:   The vendor has released a patch, available at:

http://download.macromedia.com/pub/security/jrun/40/MPSB02-14_JRun.zip

Macromedia indicates that you should apply the changes by downloading the .zip file and extracting 'webservices.jar'. Then, you should stop the JRun 4.0 server and apply the jar file to an existing installation of JRun 4.0 in the '/jrun4/lib' directory.

For more information, see the Vendor URL.

Vendor URL:  www.macromedia.com/v1/handlers/index.cfm?ID=23559 (Links to External Site)
Cause:   Exception handling error, Input validation error

Message History:   None.


 Source Message Contents

Subject:  New Macromedia Security Zone Bulletins Posted



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IMPORTANT:

Several security issues that may affect Macromedia JRun and
ColdFusion customers have come to our attention recently.

To learn about these new issues and what actions you can
take to address them, please visit the Security Zone at
the Macromedia website:

http://www.macromedia.com/security
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
MSPB02-14 - Patch available for web services denial-of-service vulnerability in JRun 4.0 and ColdFusion MX.

Originally Posted: December 11, 2002

~~~~~~~
SUMMARY

Web services in JRun 4.0 and ColdFusion MX products are vulnerable to a denial of service attack by passing incorrectly formed messages
 to the SOAP interfaces exposed by ColdFusion MX and JRun.    Both products use an XML parser (either Crimson or Xerces)  that can
 be made to run in an almost infinite loop with this specially form message  -  exhausting CPU resources.

~~~~~~~
WHAT CUSTOMERS SHOULD DO:


We strongly encourage customers to download and install this patch immediately. 


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Reporting Security Issues
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Macromedia is committed to addressing security issues and
providing customers with the information on how they can
protect themselves. If you identify what you believe may
be a security issue with a Macromedia product, please
send an e-mail to secure@macromedia.com. We will work to
appropriately address and communicate the issue.

~~~~~~~
Receiving Security Bulletins:

When Macromedia becomes aware of a security issue that we
believe significantly affects our products or customers,
we will notify customers when appropriate. Typically, this
notification will be in the form of a security bulletin
explaining the issue and the response. Macromedia customers
who would like to receive notification of new security
bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Macromedia,
please visit the Security Zone at:

http://www.macromedia.com/security

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE INFORMATION PROVIDED BY MACROMEDIA IN THIS BULLETIN
IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND.
MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES,
WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY OF
NON-INFRINGEMENT, TITLE OR QUIET ENJOYMENT. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED
WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.

IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT
LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS
INTERRUPTION OR THE LIKE, OR LOSS OF BUSINESS DAMAGES,
BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF
CONTRACT, BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE),
PRODUCT LIABILITY OR OTHERWISE, EVEN IF MACROMEDIA, INC.
OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF
LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE
ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND
YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM STATE
TO STATE.

Macromedia reserves the right to update the information in
this document with current information.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC