10
CVSSv2

CVE-2008-4226

Published: 25/11/2008 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Vulnerable Product Search on Vulmon Subscribe to Product

xmlsoft libxml 2.7.2

Vendor Advisories

Synopsis Important: libxml2 security update Type/Severity Security Advisory: Important Topic Updated libxml2 packages that fix security issues are now available forRed Hat Enterprise Linux 21, 3, 4, and 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Drew Yao discovered that libxml2 did not correctly handle certain corrupt XML documents If a user or automated system were tricked into processing a malicious XML document, a remote attacker could cause applications linked against libxml2 to enter an infinite loop, leading to a denial of service (CVE-2008-4225) ...

References

CWE-399https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.htmlhttp://secunia.com/advisories/32773http://secunia.com/advisories/32807http://www.debian.org/security/2008/dsa-1666http://secunia.com/advisories/32762http://www.ubuntu.com/usn/usn-673-1http://securitytracker.com/id?1021238https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10http://www.mandriva.com/security/advisories?name=MDVSA-2008:231http://wiki.rpath.com/Advisories:rPSA-2008-0325http://secunia.com/advisories/32766http://www.redhat.com/support/errata/RHSA-2008-0988.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=470466http://www.securityfocus.com/bid/32326http://www.osvdb.org/49993http://secunia.com/advisories/32764http://secunia.com/advisories/32802https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.htmlhttps://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974http://secunia.com/advisories/32811http://secunia.com/advisories/32872http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.htmlhttp://secunia.com/advisories/33417http://support.avaya.com/elmodocs2/security/ASA-2009-002.htmhttp://security.gentoo.org/glsa/glsa-200812-06.xmlhttp://secunia.com/advisories/32974http://www.vmware.com/security/advisories/VMSA-2009-0001.htmlhttp://secunia.com/advisories/33792http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1http://secunia.com/advisories/33746http://support.avaya.com/elmodocs2/security/ASA-2009-067.htmhttp://secunia.com/advisories/34247http://secunia.com/advisories/35379http://lists.apple.com/archives/security-announce/2009/jun/msg00002.htmlhttp://www.vupen.com/english/advisories/2009/1522http://support.apple.com/kb/HT3613http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.htmlhttp://www.vupen.com/english/advisories/2009/1621http://support.apple.com/kb/HT3639http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1http://secunia.com/advisories/36235http://secunia.com/advisories/36173http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444http://www.vupen.com/english/advisories/2009/0034http://www.vupen.com/english/advisories/2008/3176http://www.vupen.com/english/advisories/2009/0323http://www.vupen.com/english/advisories/2009/0301https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9888https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6360https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6219https://access.redhat.com/errata/RHSA-2008:0988https://usn.ubuntu.com/673-1/https://nvd.nist.gov