Affected versions of xmlsec are subject to a denial of service vulnerability. Should a user check the signature of a message larger than 512 MB, the method expandSize(int newPos)
of class org.apache.xml.security.utils.UnsyncByteArrayOutputStream
goes in an endless loop. A remote attacker could use this flaw to supply crafted XML that would lead to a denial of service.
References
- https://nvd.nist.gov/vuln/detail/CVE-2013-5823
- https://access.redhat.com/errata/RHSA-2014:0414
- https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823
- https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html
- https://marc.info/?l=bugtraq&m=138674031212883&w=2
- https://marc.info/?l=bugtraq&m=138674073720143&w=2
- https://security.gentoo.org/glsa/glsa-201406-32.xml
- https://github.com/advisories/GHSA-8gwc-x7mg-7p7p