Potential denial of service attack against Atlas Suite due to usage of the XML parser Apache Xerces-J.
The Apache Xerces-J XML parser is vulnerable to a denial of service attack, triggered by malformed XML data. The malformed data causes the XML parser to consume CPU resource for several minutes before the data is eventually rejected. This behaviour can be used to launch a denial of service attack against any Java server application which processes XML data supplied by remote users.
CVSS Base Score: 7.1
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/85260 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:C)
AFFECTED PRODUCTS AND VERSIONS:
IBM Atlas eDiscovery Process Management 184.108.40.206 and earlier
IBM Disposal and Governance Management for IT 220.127.116.11 and earlier
IBM Global Retention Policy and Schedule Management 18.104.22.168 and earlier
|Fix*||VRMF||APAR||Where to get the fix|
|22.214.171.124||None||IBM Fix Central|
|None||Apply 6.0.1 Fix Pack 5 from Fix Central|
· Complete CVSS Guide
· On-line Calculator V2
· X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/85260
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
The issue has been reported publicly, by a third party, to the Apache Xerces-J project.
23 September 2013: Original Copy Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.