Hi Jeff,

The specific problem reported to Apache only applied to Apache Xerces C++.
Xerces-J does not have the bug that was fixed in the C++ impl.

As a side note, for applications which do not want to trust documents
containing DTDs there's been a feature [1] available in Xerces-J for years
which will block them. There's also the JAXP secure processing feature [2]
which folks should also be enabling if they're concerned about DoS attacks.

Thanks.

[1] http://xerces.apache.org/xerces2-j/features.html#disallow-doctype-decl
[2]
http://xerces.apache.org/xerces2-j/javadocs/api/javax/xml/XMLConstants.html#FEATURE_SECURE_PROCESSING

Michael Glavassevich
XML Parser Development
IBM Toronto Lab
E-mail: mrgla...@ca.ibm.com
E-mail: mrgla...@apache.org

Jeffrey Sinclair <j...@cooljeff.co.uk> wrote on 08/10/2009 05:18:53 PM:

> j-users,
>
> There was a vulnerability report relating to a denial of service attack
> with Xerces recently [1]. The vulnerability report does not appear to go
> into much detail, however the link [2] to the C++ impl of Xerces would
> suggest it relates to nested DTD structures (I assume infinite
> recursion).
>
> The report lists all versions of Apache Xerces as being impacted. Would
> someone be able to confirm if there is an issue with Xerces for Java and
> if so what the actual issue is?
>
> Thanks in advance for any help.
>
> Regards,
>
> Jeff
>
> [1] https://www.cert.fi/en/reports/2009/vulnerability2009085.html
> [2] http://svn.apache.org/viewvc?view=rev&revision=781488
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: j-users-unsubscr...@xerces.apache.org
> For additional commands, e-mail: j-users-h...@xerces.apache.org

Reply via email to