10

CVE-2008-3529

Exploit

Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
XmlsoftLibxml2 Version < 2.7.0
DebianDebian Linux Version4.0
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version7.04
CanonicalUbuntu Linux Version7.10
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.04 SwEditionlts
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
AppleSafari Version < 4.0
AppleSafari Version >= 3.2.0 < 3.2.3
AppleiPhone OS Version < 3.0
ApplemacOS X Version < 10.5.7
ApplemacOS X Version10.5.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 58.86% 0.981
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://xmlsoft.org/news.html
Vendor Advisory
Release Notes
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
Third Party Advisory
US Government Resource
https://usn.ubuntu.com/644-1/
Third Party Advisory
http://securitytracker.com/id?1020855
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/31126
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=461015
Third Party Advisory
Issue Tracking
https://www.exploit-db.com/exploits/8798
Third Party Advisory
Exploit
VDB Entry