RHEL 5 : xerces-j2 (RHSA-2009:1615)

Medium Nessus Plugin ID 42944


The remote Red Hat host is missing one or more security updates.


Updated xerces-j2 packages that fix a security issue are now available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The xerces-j2 packages provide the Apache Xerces2 Java Parser, a high-performance XML parser. A Document Type Definition (DTD) defines the legal syntax (and also which elements can be used) for certain types of files, such as XML files.

A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier in DTDs. A remote attacker could provide a specially crafted XML file, which once parsed by an application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang due to excessive CPU use). (CVE-2009-2625)

Users should upgrade to these updated packages, which contain a backported patch to correct this issue. Applications using the Apache Xerces2 Java Parser must be restarted for this update to take effect.


Update the affected packages.

See Also



Plugin Details

Severity: Medium

ID: 42944

File Name: redhat-RHSA-2009-1615.nasl

Version: $Revision: 1.21 $

Type: local

Agent: unix

Published: 2009/12/01

Modified: 2017/01/03

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:xerces-j2, p-cpe:/a:redhat:enterprise_linux:xerces-j2-demo, p-cpe:/a:redhat:enterprise_linux:xerces-j2-javadoc-apis, p-cpe:/a:redhat:enterprise_linux:xerces-j2-javadoc-impl, p-cpe:/a:redhat:enterprise_linux:xerces-j2-javadoc-other, p-cpe:/a:redhat:enterprise_linux:xerces-j2-javadoc-xni, p-cpe:/a:redhat:enterprise_linux:xerces-j2-scripts, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/11/30

Reference Information

CVE: CVE-2009-2625

BID: 35958

OSVDB: 56984

RHSA: 2009:1615

CWE: 264