doom has asked for the wisdom of the Perl Monks concerning the following question:

There's a story going around about DOS vulnerabilities in common XML libraries.

How does this relate to perl's XML tools? Which ones would be affected by this issue?

Replies are listed 'Best First'.
Re: XML DOS vulnerability?
by Anonymous Monk on Aug 08, 2009 at 03:46 UTC
    Since CERT-FI hasn't mentioned perl, no perl XML tools are vulnerable, maybe :) who knows? probably the same vulnerabilities exist

      The report indicates vulnerabilities for:

      • python with libexpat
      • xerces
      • sun jre builtin xml parser

      AFAIK, of these, only libexpat is widely used in Perl. If your code makes use of XML::Parser, you probably have the same vulnerability.

      The main alternative, XML::LibXML, is based on libxml2, which was not mentioned in the report, so it might be safe.

        The CERT report does cite libxml2 now as well, so this seems to be a very pervasive issue.

        Patches for libxml2 can be found in this Bugzilla ticket against 2.5.10, 2.6.16, and 2.6.26. It does not appear that this fix has been rolled into an official release yet.
Re: XML DOS vulnerability?
by DrHyde (Prior) on Aug 10, 2009 at 09:32 UTC