oss-sec mailing list archives
Re: CVE Request -- python (SimpleXMLRPCServer): DoS (excessive CPU usage) via malformed XML-RPC / HTTP POST request
From: Kurt Seifried <kseifried () redhat com>
Date: Mon, 13 Feb 2012 08:57:49 -0700
On 02/13/2012 07:03 AM, Jan Lieskovsky wrote:
Hello Kurt, Steve, vendors, we have been notified by Daniel Callaghan via: [1] https://bugzilla.redhat.com/show_bug.cgi?id=789790 about a denial of service flaw present in the way Simple XML-RPC Server module of Python processed client connections, that were closed prior the complete request body has been received. A remote attacker could use this flaw to cause Python Simple XML-RPC based server process to consume excessive amount of CPU. Issue has been reported upstream at: [2] http://bugs.python.org/issue14001 Could you allocate a CVE identifier for this? Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Please use CVE-2012-0845 for this issue. -- Kurt Seifried Red Hat Security Response Team (SRT)
Current thread:
- CVE Request -- python (SimpleXMLRPCServer): DoS (excessive CPU usage) via malformed XML-RPC / HTTP POST request Jan Lieskovsky (Feb 13)
- Re: CVE Request -- python (SimpleXMLRPCServer): DoS (excessive CPU usage) via malformed XML-RPC / HTTP POST request Kurt Seifried (Feb 13)