Lucene search

K
gentooGentoo FoundationGLSA-201202-09
HistoryFeb 29, 2012 - 12:00 a.m.

libxml2: User-assisted execution of arbitrary code

2012-02-2900:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.025 Low

EPSS

Percentile

89.9%

Background

libxml2 is the XML C parser and toolkit developed for the Gnome project.

Description

The “xmlStringLenDecodeEntities()” function in parser.c contains a boundary error which could possibly cause a heap-based buffer overflow.

Impact

A remote attacker could entice a user to open a specially crafted XML file in an application linked against libxml2, possibly resulting in the remote execution of arbitrary code with the permissions of the user running the application, or Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All libxml2 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.8-r4"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/libxml2< 2.7.8-r4UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.025 Low

EPSS

Percentile

89.9%