Gentoo Archives: gentoo-announce

From: Yury German <blueknight@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201604-02 ] Xalan-Java: Arbitrary code execution
Date: Sat, 02 Apr 2016 20:26:31
Message-Id: 57002A9A.8040509@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201604-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Xalan-Java: Arbitrary code execution
9 Date: April 02, 2016
10 Bugs: #505602
11 ID: 201604-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Insufficient constraints in Apache's Xalan-Java might allow remote
19 attackers to execute arbitrary code and load arbitrary classes.
20
21 Background
22 ==========
23
24 Xalan-Java is an XSLT processor for transforming XML documents into
25 HTML, text, or other XML document types.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-java/xalan < 2.7.2 >= 2.7.2
34
35 Description
36 ===========
37
38 The TransformerFactory in Apache Xalan-Java does not properly restrict
39 access to certain properties when FEATURE_SECURE_PROCESSING is enabled.
40 This can also be exploited via a Java property that is bound to the
41 XSLT 1.0 system-property function.
42
43 Impact
44 ======
45
46 A remote attacker could inject specially crafted XSLT properties
47 resulting in the execution of arbitrary code with the privileges of the
48 process.
49
50 Workaround
51 ==========
52
53 There is no known work around at this time.
54
55 Resolution
56 ==========
57
58 All Xalan-Java users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=dev-java/xalan-2.7.2"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2014-0107
67 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0107
68
69 Availability
70 ============
71
72 This GLSA and any updates to it are available for viewing at
73 the Gentoo Security Website:
74
75 https://security.gentoo.org/glsa/201604-02
76
77 Concerns?
78 =========
79
80 Security is a primary focus of Gentoo Linux and ensuring the
81 confidentiality and security of our users' machines is of utmost
82 importance to us. Any security concerns should be addressed to
83 security@g.o or alternatively, you may file a bug at
84 https://bugs.gentoo.org.
85
86 License
87 =======
88
89 Copyright 2016 Gentoo Foundation, Inc; referenced text
90 belongs to its owner(s).
91
92 The contents of this document are licensed under the
93 Creative Commons - Attribution / Share Alike license.
94
95 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature