CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
90.2%
The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:* |
debian | debian_linux | 3.1 | cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:* |
bugs.gentoo.org/show_bug.cgi?id=202628
lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
lists.vmware.com/pipermail/security-announce/2008/000009.html
mail.gnome.org/archives/xml/2008-January/msg00036.html
secunia.com/advisories/28439
secunia.com/advisories/28444
secunia.com/advisories/28450
secunia.com/advisories/28452
secunia.com/advisories/28458
secunia.com/advisories/28466
secunia.com/advisories/28470
secunia.com/advisories/28475
secunia.com/advisories/28636
secunia.com/advisories/28716
secunia.com/advisories/28740
secunia.com/advisories/29591
secunia.com/advisories/31074
security.gentoo.org/glsa/glsa-200801-20.xml
securitytracker.com/id?1019181
sunsolve.sun.com/search/document.do?assetkey=1-26-103201-1
sunsolve.sun.com/search/document.do?assetkey=1-66-201514-1
support.avaya.com/elmodocs2/security/ASA-2008-047.htm
support.avaya.com/elmodocs2/security/ASA-2008-050.htm
www.debian.org/security/2008/dsa-1461
www.mandriva.com/security/advisories?name=MDVSA-2008:010
www.novell.com/linux/security/advisories/suse_security_summary_report.html
www.redhat.com/support/errata/RHSA-2008-0032.html
www.securityfocus.com/archive/1/486410/100/0/threaded
www.securityfocus.com/archive/1/490306/100/0/threaded
www.securityfocus.com/bid/27248
www.vupen.com/english/advisories/2008/0117
www.vupen.com/english/advisories/2008/0144
www.vupen.com/english/advisories/2008/1033/references
www.vupen.com/english/advisories/2008/2094/references
www.xmlsoft.org/news.html
bugzilla.redhat.com/show_bug.cgi?id=425927
issues.rpath.com/browse/RPL-2121
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11594
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5216
usn.ubuntu.com/569-1/
www.redhat.com/archives/fedora-package-announce/2008-January/msg00379.html
www.redhat.com/archives/fedora-package-announce/2008-January/msg00396.html