Bug 771896 (CVE-2011-3919) - CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name
Summary: CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity ref...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-3919
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 755814 771904 771906 771907 771910 771913 772122 785155 820846 833934 891477 891478
Blocks: 771915 785172 891480
TreeView+ depends on / blocked
 
Reported: 2012-01-05 10:46 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-02-24 13:31 UTC (History)
4 users (show)

Fixed In Version: libxml2 2.8.0
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-09-18 20:32:12 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0016 0 normal SHIPPED_LIVE Important: libxml2 security update 2012-01-11 22:47:42 UTC
Red Hat Product Errata RHSA-2012:0017 0 normal SHIPPED_LIVE Important: libxml2 security update 2012-01-11 22:45:39 UTC
Red Hat Product Errata RHSA-2012:0018 0 normal SHIPPED_LIVE Important: libxml2 security update 2012-01-11 22:58:23 UTC
Red Hat Product Errata RHSA-2012:0104 0 normal SHIPPED_LIVE Important: libxml2 security update 2012-02-09 00:45:38 UTC
Red Hat Product Errata RHSA-2013:0217 0 normal SHIPPED_LIVE Important: mingw32-libxml2 security update 2013-02-01 00:25:14 UTC

Description Huzaifa S. Sidhpurwala 2012-01-05 10:46:57 UTC
A heap-based buffer overflow was found in the way libxml2 decoded an entity reference with a long name. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application.

Reference: http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html
Patch: http://git.gnome.org/browse/libxml2/commit/?id=5bd3c061823a8499b27422aee04ea20aae24f03e

Comment 6 Huzaifa S. Sidhpurwala 2012-01-06 04:23:00 UTC
Created libxml2 tracking bugs for this issue

Affects: fedora-all [bug 772122]

Comment 8 errata-xmlrpc 2012-01-11 17:50:06 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2012:0017 https://rhn.redhat.com/errata/RHSA-2012-0017.html

Comment 9 errata-xmlrpc 2012-01-11 17:50:27 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2012:0016 https://rhn.redhat.com/errata/RHSA-2012-0016.html

Comment 10 errata-xmlrpc 2012-01-11 18:00:39 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:0018 https://rhn.redhat.com/errata/RHSA-2012-0018.html

Comment 11 Huzaifa S. Sidhpurwala 2012-01-12 05:59:59 UTC
Created mingw32-libxml2 tracking bugs for this issue

Affects: fedora-all [bug 755814]

Comment 12 Huzaifa S. Sidhpurwala 2012-01-12 06:00:12 UTC
Statement:

This issue affected the versions of libxml2 as shipped with Red Hat Enterprise Linux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and RHSA-2012:0018 respectively.

Comment 14 errata-xmlrpc 2012-02-08 19:47:31 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5.6 EUS - Server Only

Via RHSA-2012:0104 https://rhn.redhat.com/errata/RHSA-2012-0104.html

Comment 16 errata-xmlrpc 2013-01-31 19:33:25 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0217 https://rhn.redhat.com/errata/RHSA-2013-0217.html


Note You need to log in before you can comment on or make changes to this bug.