製品・ソフトウェアに関する情報
IBM Rational DOORS Next Generation および Rational Requirements Composer の XML パーサにおけるサービス運用妨害 (DoS) の脆弱性
Title IBM Rational DOORS Next Generation および Rational Requirements Composer の XML パーサにおけるサービス運用妨害 (DoS) の脆弱性
Summary

IBM Rational DOORS Next Generation および Rational Requirements Composer の XML パーサは、エンティティ展開中の再帰呼出を適切に検知しないため、サービス運用妨害 (メモリ消費) 状態にされる脆弱性が存在します。 本脆弱性は、CVE-2003-1564 と同様の問題です。

Possible impacts 第三者により、大量のネストされたエンティティ参照を含む巧妙に細工された XML ドキュメントを介して、サービス運用妨害 (メモリ消費) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 5, 2015, midnight
Registration Date March 19, 2015, 1:54 p.m.
Last Update March 19, 2015, 1:54 p.m.
CVSS2.0 : 危険
Score 7.8
Vector AV:N/AC:L/Au:N/C:N/I:N/A:C
Affected System
IBM
Rational DOORS Next Generation 4.0.7 iFix3 未満の 4.x
Rational DOORS Next Generation 5.0.2 未満の 5.x
Rational Requirements Composer 2.x
Rational Requirements Composer 3.0.1.6 iFix5 未満の 3.x
Rational Requirements Composer 4.0.7 iFix3 未満の 4.x
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2015年03月19日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2015-0132
Summary

The XML parser in IBM Rational DOORS Next Generation 4.x before 4.0.7 iFix3 and 5.x before 5.0.2 and Rational Requirements Composer 2.x and 3.x before 3.0.1.6 iFix5 and 4.x before 4.0.7 iFix3 does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.

Publication Date March 18, 2015, 7:59 p.m.
Registration Date Jan. 26, 2021, 2:43 p.m.
Last Update Nov. 21, 2024, 11:22 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:2.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_requirements_composer:3.0.1.3:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:5.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:rational_doors_next_generation:4.0.3:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List