Vulnerability & Exploit Database

Displaying entries 1 - 10 of 30 in total

Results for: CVE-2008-4225 Back to search

Sun Patch: Sun Management Center 4.0_x86: Patch for Solaris 10_x86 Vulnerability

  • Severity: 10
  • Published: December 09, 2009

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Sun Patch: Sun Management Center 4.0: Patch for Solaris 9_x86 Vulnerability

  • Severity: 10
  • Published: November 25, 2009

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Sun Patch: Sun Management Center 4.0: Patch for Solaris 9 Vulnerability

  • Severity: 10
  • Published: November 25, 2009

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Sun Patch: Sun Management Center 4.0: Patch for Solaris 8 Vulnerability

  • Severity: 10
  • Published: November 25, 2009

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Sun Patch: Sun Management Center 3.6.1_x86: Patch for Solaris 10 Vulnerability

  • Severity: 10
  • Published: November 25, 2009

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Sun Patch: Sun Management Center 3.6.1_x86: Patch for Solaris 9 Vulnerability

  • Severity: 10
  • Published: November 25, 2009

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

USN-673-1: libxml2 vulnerabilities Vulnerability

  • Severity: 10
  • Published: November 25, 2008

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

SUSE Linux Security Vulnerability: CVE-2008-4225 Vulnerability

  • Severity: 8
  • Published: November 25, 2008

Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.

RHSA-2008:0988: libxml2 security update Vulnerability

  • Severity: 10
  • Published: November 25, 2008

libxml2 is a library for parsing and manipulating XML files. It includessupport for reading, modifying, and writing XML and HTML files.An integer overflow flaw causing a heap-based buffer overflow was found inthe libxml2 XML parser. If an application linked against libxml2 processeduntrusted, malformed XML content, it could cause the app...