6.5
CVSSv3

CVE-2008-3281

Published: 27/08/2008 Updated: 02/02/2024
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

libxml2 2.6.32 and previous versions does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent malicious users to cause a denial of service (memory and CPU consumption) via a crafted XML document.

Vulnerable Product Search on Vulmon Subscribe to Product

xmlsoft libxml2

apple safari

apple iphone os

fedoraproject fedora 9

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

debian debian linux 4.0

redhat enterprise linux server 5.0

redhat enterprise linux desktop 3.0

redhat enterprise linux workstation 5.0

redhat enterprise linux desktop 4.0

redhat enterprise linux desktop 5.0

redhat enterprise linux eus 4.7

redhat enterprise linux server 4.0

redhat enterprise linux workstation 4.0

redhat enterprise linux workstation 3.0

redhat enterprise linux server 3.0

redhat enterprise linux eus 5.2

redhat enterprise linux server 2.0

redhat enterprise linux workstation 2.0

vmware esx 2.5.4

vmware esx 3.0.2

vmware esx 2.5.5

vmware esx 3.0.3

Vendor Advisories

It was discovered that libxml2 did not correctly handle long entity names If a user were tricked into processing a specially crafted XML document, a remote attacker could execute arbitrary code with user privileges or cause the application linked against libxml2 to crash, leading to a denial of service (CVE-2008-3529) ...
Andreas Solberg discovered that libxml2 did not handle recursive entities safely If an application linked against libxml2 were made to process a specially crafted XML document, a remote attacker could exhaust the system’s CPU resources, leading to a denial of service ...
Andreas Solberg discovered that libxml2, the GNOME XML library, could be forced to recursively evaluate entities, until available CPU and memory resources were exhausted For the stable distribution (etch), this problem has been fixed in version 2627dfsg-4 For the unstable distribution (sid), this problem has been fixed in version 2632dfsg-3 ...

References

CWE-776http://mail.gnome.org/archives/xml/2008-August/msg00034.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=458086http://www.mandriva.com/security/advisories?name=MDVSA-2008:180https://rhn.redhat.com/errata/RHSA-2008-0836.htmlhttp://www.securityfocus.com/bid/30783http://www.ubuntu.com/usn/usn-640-1http://secunia.com/advisories/31728http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.htmlhttp://xmlsoft.org/news.htmlhttp://secunia.com/advisories/31558http://secunia.com/advisories/31748https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.htmlhttp://secunia.com/advisories/31590http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.htmlhttp://secunia.com/advisories/31855http://www.mandriva.com/security/advisories?name=MDVSA-2008:192http://www.vmware.com/security/advisories/VMSA-2008-0017.htmlhttp://lists.vmware.com/pipermail/security-announce/2008/000039.htmlhttp://secunia.com/advisories/32488http://secunia.com/advisories/31566http://www.securitytracker.com/id?1020728http://www.debian.org/security/2008/dsa-1631http://secunia.com/advisories/32807http://wiki.rpath.com/Advisories:rPSA-2008-0325http://security.gentoo.org/glsa/glsa-200812-06.xmlhttp://secunia.com/advisories/32974http://secunia.com/advisories/31982http://www.vupen.com/english/advisories/2009/1522http://secunia.com/advisories/35379http://support.apple.com/kb/HT3613http://lists.apple.com/archives/security-announce/2009/jun/msg00002.htmlhttp://lists.apple.com/archives/security-announce/2009/Jun/msg00005.htmlhttp://www.vupen.com/english/advisories/2009/1621http://support.apple.com/kb/HT3639http://www.vupen.com/english/advisories/2008/2843http://www.vupen.com/english/advisories/2008/2971http://www.vupen.com/english/advisories/2008/2419https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496https://usn.ubuntu.com/644-1/http://www.securityfocus.com/archive/1/497962/100/0/threadedhttps://usn.ubuntu.com/644-1/https://nvd.nist.gov