SB2013042606 - Resource management error in Libxml2
Published: April 26, 2013 Updated: August 11, 2020
Security Bulletin ID
SB2013042606
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Resource management error (CVE-ID: CVE-2013-1969)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html
- http://secunia.com/advisories/53061
- http://www.openwall.com/lists/oss-security/2013/04/17/4
- http://www.openwall.com/lists/oss-security/2013/04/19/1
- http://www.ubuntu.com/usn/USN-1817-1
- https://bugzilla.gnome.org/show_bug.cgi?id=690202
- https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f