Vulnerability Name: CVE-2004-0989 (CCN-17870) Assigned: 2004-10-25 Published: 2004-10-25 Updated: 2017-10-11 Summary: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Mon Oct 25 2004 - 19:51:32 CDT libxml2 remote buffer overflows (not in xml parsing code though) Source: MITRE Type: CNACVE-2004-0989 Source: CONECTIVA Type: UNKNOWNCLA-2004:890 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:890Fixes for libxml2 buffer overflow vulnerabilities Source: APPLE Type: UNKNOWNAPPLE-SA-2005-01-25 Source: BUGTRAQ Type: UNKNOWN20041026 libxml2 remote buffer overflows (not in xml parsing code though) Source: CCN Type: RHSA-2004-615libxml2 security update Source: CCN Type: RHSA-2004-650libxml security update Source: CCN Type: SA13000Libxml2 Multiple Buffer Overflows Source: SECUNIA Type: UNKNOWN13000 Source: CCN Type: SECTRACK ID: 1011941Libxml2 URL Parsing and DNS Resolution Buffer Overflows May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN1011941 Source: CCN Type: CIAC Information Bulletin P-029libxml and libxml2 Buffer Overflow Source: CIAC Type: UNKNOWNP-029 Source: CCN Type: CIAC Information Bulletin P-073Updated "libxml" Packages for Versions Prior to 2.6.14 Source: CCN Type: CIAC Information Bulletin P-116Apple Security Update 2005-001 for Mac OS X Source: DEBIAN Type: UNKNOWNDSA-582 Source: DEBIAN Type: DSA-582libxml -- buffer overflow Source: CCN Type: GLSA-200411-05libxml2: Remotely exploitable buffer overflow Source: GENTOO Type: UNKNOWNGLSA-200411-05 Source: SUSE Type: UNKNOWNSUSE-SR:2005:001 Source: CCN Type: OpenPKG-SA-2004.050Libxml Source: OSVDB Type: UNKNOWN11179 Source: OSVDB Type: UNKNOWN11180 Source: OSVDB Type: UNKNOWN11324 Source: CCN Type: OSVDB ID: 11179libxml2 FTP URL Processing Overflow Source: CCN Type: OSVDB ID: 11180libxml2 DNS Reply Overflows Source: CCN Type: OSVDB ID: 11324libxml2 Proxy FTP URL Processing Overflow Source: REDHAT Type: UNKNOWNRHSA-2004:615 Source: REDHAT Type: UNKNOWNRHSA-2004:650 Source: BID Type: Exploit, Patch, Vendor Advisory11526 Source: CCN Type: BID-11526Libxml2 Multiple Remote Stack Buffer Overflow Vulnerabilities Source: CCN Type: Trustix Secure Linux Security Advisory #2004-0055multiple security issues Source: CCN Type: TLSA-2005-11Buffer overflow vulnerabilites exist in libxml Source: CCN Type: TLSA-2005-12Buffer overflow vulnerabilites exist in libxml2 Source: CCN Type: USN-89-1XML library vulnerabilities Source: CCN Type: XML C parser and toolkit of Gnome Web siteLibxml2 Source: XF Type: UNKNOWNlibxml2-xmlnanoftpscanurl-bo(17870) Source: XF Type: UNKNOWNlibxml2-xmlnanoftpscanurl-bo(17870) Source: XF Type: UNKNOWNlibxml2-nanoftp-file-bo(17872) Source: XF Type: UNKNOWNlibxml2-xmlnanoftpscanproxy-bo(17875) Source: XF Type: UNKNOWNlibxml2-nanohttp-file-bo(17876) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:10505 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:1173 Source: SUSE Type: SUSE-SA:2004:040samba: remote denial of service Source: SUSE Type: SUSE-SR:2005:001SUSE Security Summary Report Source: UBUNTU Type: UNKNOWNUSN-89-1 Vulnerable Configuration: Configuration 1 :cpe:/a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:* OR cpe:/a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:* Configuration 2 :cpe:/o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:* OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2004-0989 (CCN-17872) Assigned: 2004-10-25 Published: 2004-10-25 Updated: 2004-10-25 Summary: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Mon Oct 25 2004 - 19:51:32 CDT libxml2 remote buffer overflows (not in xml parsing code though) Source: MITRE Type: CNACVE-2004-0989 Source: CCN Type: RHSA-2004-615libxml2 security update Source: CCN Type: RHSA-2004-650libxml security update Source: CCN Type: SA13000Libxml2 Multiple Buffer Overflows Source: CCN Type: SECTRACK ID: 1011941Libxml2 URL Parsing and DNS Resolution Buffer Overflows May Let Remote Users Execute Arbitrary Code Source: CCN Type: CIAC Information Bulletin P-029libxml and libxml2 Buffer Overflow Source: CCN Type: CIAC Information Bulletin P-073Updated "libxml" Packages for Versions Prior to 2.6.14 Source: CCN Type: CIAC Information Bulletin P-116Apple Security Update 2005-001 for Mac OS X Source: DEBIAN Type: DSA-582libxml -- buffer overflow Source: CCN Type: GLSA-200411-05libxml2: Remotely exploitable buffer overflow Source: CCN Type: OpenPKG-SA-2004.050Libxml Source: CCN Type: OSVDB ID: 11179libxml2 FTP URL Processing Overflow Source: CCN Type: OSVDB ID: 11180libxml2 DNS Reply Overflows Source: CCN Type: OSVDB ID: 11324libxml2 Proxy FTP URL Processing Overflow Source: CCN Type: BID-11526Libxml2 Multiple Remote Stack Buffer Overflow Vulnerabilities Source: CCN Type: Trustix Secure Linux Security Advisory #2004-0055multiple security issues Source: CCN Type: TLSA-2005-11Buffer overflow vulnerabilites exist in libxml Source: CCN Type: TLSA-2005-12Buffer overflow vulnerabilites exist in libxml2 Source: CCN Type: USN-89-1XML library vulnerabilities Source: CCN Type: XML C parser and toolkit of Gnome Web siteLibxml2 Source: XF Type: UNKNOWNlibxml2-nanoftp-file-bo(17872) Source: SUSE Type: SUSE-SA:2004:040samba: remote denial of service Source: SUSE Type: SUSE-SR:2005:001SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:workgroup:*:server:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2004-0989 (CCN-17875) Assigned: 2004-10-25 Published: 2004-10-25 Updated: 2004-10-25 Summary: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Mon Oct 25 2004 - 19:51:32 CDT libxml2 remote buffer overflows (not in xml parsing code though) Source: MITRE Type: CNACVE-2004-0989 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2004:890Fixes for libxml2 buffer overflow vulnerabilities Source: CCN Type: RHSA-2004-615libxml2 security update Source: CCN Type: RHSA-2004-650libxml security update Source: CCN Type: SA13000Libxml2 Multiple Buffer Overflows Source: CCN Type: SECTRACK ID: 1011941Libxml2 URL Parsing and DNS Resolution Buffer Overflows May Let Remote Users Execute Arbitrary Code Source: CCN Type: CIAC Information Bulletin P-029libxml and libxml2 Buffer Overflow Source: CCN Type: CIAC Information Bulletin P-073Updated "libxml" Packages for Versions Prior to 2.6.14 Source: CCN Type: CIAC Information Bulletin P-116Apple Security Update 2005-001 for Mac OS X Source: DEBIAN Type: DSA-582libxml -- buffer overflow Source: CCN Type: GLSA-200411-05libxml2: Remotely exploitable buffer overflow Source: CCN Type: OpenPKG-SA-2004.050Libxml Source: CCN Type: OSVDB ID: 11179libxml2 FTP URL Processing Overflow Source: CCN Type: OSVDB ID: 11180libxml2 DNS Reply Overflows Source: CCN Type: OSVDB ID: 11324libxml2 Proxy FTP URL Processing Overflow Source: CCN Type: BID-11526Libxml2 Multiple Remote Stack Buffer Overflow Vulnerabilities Source: CCN Type: Trustix Secure Linux Security Advisory #2004-0055multiple security issues Source: CCN Type: TLSA-2005-11Buffer overflow vulnerabilites exist in libxml Source: CCN Type: TLSA-2005-12Buffer overflow vulnerabilites exist in libxml2 Source: CCN Type: USN-89-1XML library vulnerabilities Source: CCN Type: XML C parser and toolkit of Gnome Web siteLibxml2 Source: XF Type: UNKNOWNlibxml2-xmlnanoftpscanproxy-bo(17875) Source: SUSE Type: SUSE-SA:2004:040samba: remote denial of service Source: SUSE Type: SUSE-SR:2005:001SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:* OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:conectiva:linux:10:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:workgroup:*:server:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:* Denotes that component is vulnerableVulnerability Name: CVE-2004-0989 (CCN-17876) Assigned: 2004-10-25 Published: 2004-10-25 Updated: 2004-10-25 Summary: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Consequences: Gain Access References: Source: CCN Type: BugTraq Mailing List, Mon Oct 25 2004 - 19:51:32 CDT libxml2 remote buffer overflows (not in xml parsing code though) Source: MITRE Type: CNACVE-2004-0989 Source: CCN Type: RHSA-2004-615libxml2 security update Source: CCN Type: RHSA-2004-650libxml security update Source: CCN Type: SA13000Libxml2 Multiple Buffer Overflows Source: CCN Type: SECTRACK ID: 1011941Libxml2 URL Parsing and DNS Resolution Buffer Overflows May Let Remote Users Execute Arbitrary Code Source: CCN Type: CIAC Information Bulletin P-029libxml and libxml2 Buffer Overflow Source: CCN Type: CIAC Information Bulletin P-073Updated "libxml" Packages for Versions Prior to 2.6.14 Source: CCN Type: CIAC Information Bulletin P-116Apple Security Update 2005-001 for Mac OS X Source: DEBIAN Type: DSA-582libxml -- buffer overflow Source: CCN Type: GLSA-200411-05libxml2: Remotely exploitable buffer overflow Source: CCN Type: OpenPKG-SA-2004.050Libxml Source: CCN Type: OSVDB ID: 11179libxml2 FTP URL Processing Overflow Source: CCN Type: OSVDB ID: 11180libxml2 DNS Reply Overflows Source: CCN Type: OSVDB ID: 11324libxml2 Proxy FTP URL Processing Overflow Source: CCN Type: BID-11526Libxml2 Multiple Remote Stack Buffer Overflow Vulnerabilities Source: CCN Type: Trustix Secure Linux Security Advisory #2004-0055multiple security issues Source: CCN Type: TLSA-2005-11Buffer overflow vulnerabilites exist in libxml Source: CCN Type: TLSA-2005-12Buffer overflow vulnerabilites exist in libxml2 Source: CCN Type: USN-89-1XML library vulnerabilities Source: CCN Type: XML C parser and toolkit of Gnome Web siteLibxml2 Source: XF Type: UNKNOWNlibxml2-nanohttp-file-bo(17876) Source: SUSE Type: SUSE-SA:2004:040samba: remote denial of service Source: SUSE Type: SUSE-SR:2005:001SUSE Security Summary Report Vulnerable Configuration: Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:* OR cpe:/a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:hosting:*:server:*:*:* OR cpe:/o:turbolinux:turbolinux_appliance:1.0:*:workgroup:*:server:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20040989 V CVE-2004-0989 2015-11-16 oval:org.mitre.oval:def:10505 V Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost. 2013-04-29 oval:org.mitre.oval:def:1173 V Multiple Buffer Overflows in libXML2 2005-08-18 oval:com.redhat.rhsa:def:20040650 P RHSA-2004:650: libxml security update (Moderate) 2005-05-26 oval:com.redhat.rhsa:def:20040615 P RHSA-2004:615: libxml2 security update (Moderate) 2004-11-12 oval:org.debian:def:582 V buffer overflow 2004-11-02
BACK
xmlsoft libxml 1.8.17
xmlsoft libxml2 2.5.11
xmlsoft libxml2 2.6.6
xmlsoft libxml2 2.6.7
xmlsoft libxml2 2.6.8
xmlsoft libxml2 2.6.9
xmlsoft libxml2 2.6.11
xmlsoft libxml2 2.6.12
xmlsoft libxml2 2.6.13
xmlsoft libxml2 2.6.14
xmlstarlet command line xml toolkit 0.9.1
redhat fedora core core_2.0
trustix secure linux 2.0
trustix secure linux 2.1
ubuntu ubuntu linux 4.1
ubuntu ubuntu linux 4.1
xmlsoft libxml2 2.6.12
xmlsoft libxml2 2.6.13
debian debian linux 3.0
openpkg openpkg current
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
trustix secure linux 2.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
trustix secure linux 2.1
mandrakesoft mandrake linux 10.0
turbolinux turbolinux appliance server 1.0_hosting
suse suse linux 9.1
redhat enterprise linux 3
openpkg openpkg 2.1
suse suse linux 9.2
openpkg openpkg 2.2
mandrakesoft mandrake linux 10.1
novell linux desktop 9
redhat linux advanced workstation 2.1
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
turbolinux turbolinux appliance server 1.0_hosting_edition
turbolinux turbolinux appliance server 1.0_workgroup_edition
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1
xmlsoft libxml2 2.6.12
xmlsoft libxml2 2.6.13
debian debian linux 3.0
openpkg openpkg current
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
conectiva linux 9.0
trustix secure linux 2.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
trustix secure linux 2.1
mandrakesoft mandrake linux 10.0
turbolinux turbolinux appliance server 1.0_hosting
suse suse linux 9.1
redhat enterprise linux 3
conectiva linux 10
openpkg openpkg 2.1
suse suse linux 9.2
openpkg openpkg 2.2
mandrakesoft mandrake linux 10.1
novell linux desktop 9
redhat linux advanced workstation 2.1
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
turbolinux turbolinux appliance server 1.0_hosting_edition
turbolinux turbolinux appliance server 1.0_workgroup_edition
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1
xmlsoft libxml2 2.6.12
xmlsoft libxml2 2.6.13
debian debian linux 3.0
openpkg openpkg current
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
trustix secure linux 2.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
trustix secure linux 2.1
mandrakesoft mandrake linux 10.0
turbolinux turbolinux appliance server 1.0_hosting
suse suse linux 9.1
redhat enterprise linux 3
openpkg openpkg 2.1
suse suse linux 9.2
openpkg openpkg 2.2
mandrakesoft mandrake linux 10.1
novell linux desktop 9
redhat linux advanced workstation 2.1
suse linux enterprise server 9
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
turbolinux turbolinux appliance server 1.0_hosting_edition
turbolinux turbolinux appliance server 1.0_workgroup_edition
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1