Closed
Bug 741713
Opened 13 years ago
Closed 8 months ago
embedded copy of expat is vulnerable to hash collision issue (CVE-2012-0876)
Categories
(Core :: XML, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 1374012
People
(Reporter: huzaifas, Unassigned)
Details
I am not sure if we should call this a security issue in the context of a web browser, but would rather file it as one and then call it non-security then the other way around.
The DoS issue caused due to hash collision affects the expat library as well.
A specially-crafted set of keys could trigger hash function collisions, which
degrade dictionary performance by changing hash table operations complexity
from an expected/average O(1) to the worst case O(n). Reporters were able to
find colliding strings efficiently using meet in the middle attack.
Since firefox embeds expat, it seems to be affects as well.
I was able to reproduce a DoS which lasted for several minutes on a quad-core machine.
Reference:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0876
Possible patch: https://bugzilla.redhat.com/attachment.cgi?id=564916
Reporter | ||
Comment 1•13 years ago
|
||
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0876 is the original link to rhbz
Reporter | ||
Comment 2•13 years ago
|
||
Bugzilla comments seems to have an issue, try #3
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0876"
Reporter | ||
Comment 3•13 years ago
|
||
Component: General → XML
Product: Firefox → Core
QA Contact: general → xml
Comment 4•13 years ago
|
||
We don't keep client-sie DOS issue private in bugzilla; there are hundreds of simpler ways to hang the browser ;-)
Group: core-security
Comment 5•11 years ago
|
||
For posterity, this issue was fixed upstream in expat version 2.1.0:
http://sourceforge.net/projects/expat/files/expat/2.1.0/
along with other CVEs:
#2895533: CVE-2012-1147 - Resource leak in readfilemap.c.
- affects xmlwf tool -> not applicable to mozilla
#1990430: CVE-2009-3720 - Parser crash with special UTF-8 sequences.
- does not seem reproducible with mozilla - no obvious reason I can see and I haven't investigated further
#2894085: CVE-2009-3560 - Buffer over-read and crash in big2_toUtf8().
- not reproducible either, but it requires DefaultHandler to be set, which only seems to happen in:
https://hg.mozilla.org/mozilla-central/file/6f702709fab6/parser/htmlparser/src/nsExpatDriver.cpp#l1261
I haven't tried to exercise that code path
#2958794: CVE-2012-1148 - Memory leak in poolGrow.
- seems applicable to mozilla
The bundled version is still 2.0.0, with no patch for the above issues applied, afaics.
Updated•3 years ago
|
Severity: minor → S4
Updated•8 months ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 8 months ago
Duplicate of bug: 1374012
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•