4.3

CVE-2010-4008

Exploit

libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GoogleChrome Version < 7.0.517.44
AppleiTunes Version < 10.2
AppleSafari Version < 5.0.4
AppleiPhone OS Version < 4.2
ApplemacOS X Version < 10.6.7
XmlsoftLibxml2 Version < 2.7.8
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version6.06 SwEditionlts
CanonicalUbuntu Linux Version8.04 SwEditionlts
CanonicalUbuntu Linux Version9.10
CanonicalUbuntu Linux Version10.04 SwEditionlts
CanonicalUbuntu Linux Version10.10
OpensuseOpensuse Version11.1
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
SuseSuse Linux Enterprise Server Version10 Updatesp3
SuseSuse Linux Enterprise Server Version11 Update-
SuseSuse Linux Enterprise Server Version11 Updatesp1
ApacheOpenoffice Version >= 2.0.0 <= 2.4.3
ApacheOpenoffice Version >= 3.0.0 < 3.3.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.57% 0.676
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://secunia.com/advisories/42109
Third Party Advisory
Vendor Advisory
http://code.google.com/p/chromium/issues/detail?id=58731
Patch
Vendor Advisory
Exploit
Issue Tracking
http://mail.gnome.org/archives/xml/2010-November/msg00015.html
Vendor Advisory
Mailing List
Release Notes
http://secunia.com/advisories/42175
Third Party Advisory
Vendor Advisory
http://www.securityfocus.com/bid/44779
Third Party Advisory
VDB Entry