CVE-2013-1969

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2013-1969 at MITRE

Description

Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
CVSS v2 Scores
  National Vulnerability Database
Base Score 7.48
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

SUSE information

Note from the SUSE Security Team

This security issue only affects libxml 2.9.0 or newer, so libxml2 versions on SUSE Linux Enterprise 11 (2.7.6) or older products are not affected.

SUSE Bugzilla entry: 815665 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 12.3
  • libxml2 >= 2.9.0-2.9.1
  • libxml2-2 >= 2.9.0-2.9.1
  • libxml2-2-32bit >= 2.9.0-2.9.1
  • libxml2-2-debuginfo >= 2.9.0-2.9.1
  • libxml2-2-debuginfo-32bit >= 2.9.0-2.9.1
  • libxml2-debugsource >= 2.9.0-2.9.1
  • libxml2-devel >= 2.9.0-2.9.1
  • libxml2-devel-32bit >= 2.9.0-2.9.1
  • libxml2-doc >= 2.9.0-2.9.1
  • libxml2-tools >= 2.9.0-2.9.1
  • libxml2-tools-debuginfo >= 2.9.0-2.9.1
  • python-libxml2 >= 2.9.0-2.9.1
  • python-libxml2-debuginfo >= 2.9.0-2.9.1
  • python-libxml2-debugsource >= 2.9.0-2.9.1
Patchnames:
openSUSE-2013-374