The SBLIM CIM Client is susceptible to hash collision attack. Since it uses HashMap to parse XML inputs, it allows the attacker to predict hashes and input malicious CIM-XML message from a WBEM (Web-Based Enterprise Management) server, causing high CPU consumption.
lists.opensuse.org/opensuse-updates/2012-12/msg00015.html
lists.opensuse.org/opensuse-updates/2013-01/msg00038.html
rhn.redhat.com/errata/RHSA-2012-0987.html
sblim.cvs.sourceforge.net/viewvc/sblim/jsr48-client/src/org/sblim/cimclient/internal/cimxml/sax/NodeFactory.java?view=log#rev1.7
sourceforge.net/p/sblim/bugs/2381/
access.redhat.com/security/updates/classification/#low
rhn.redhat.com/errata/RHSA-2012-0987.html