Revision Date: | 2013-04-29 | Version: | 12 | Title: | Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. | Description: | Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2004-0989
| Platform(s): | CentOS Linux 3 Red Hat Enterprise Linux 3
| Product(s): | | Definition Synopsis | RHEL3 or CentOS3 The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND Configuration section
libxml2-devel is earlier than 0:2.5.10-7
OR libxml2-python is earlier than 0:2.5.10-7
OR libxml-devel is earlier than 1:1.8.17-9.2
OR libxml is earlier than 1:1.8.17-9.2
OR libxml2 is earlier than 0:2.5.10-7
|
|