Rapid7 Vulnerability & Exploit Database

RHSA-2012:1288: libxml2 security update

Back to Search

RHSA-2012:1288: libxml2 security update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
06/27/2012
Created
07/25/2018
Added
09/29/2012
Modified
07/04/2017

Description

The libxml2 library is a development toolbox providing the implementationof various XML standards.Multiple integer overflow flaws, leading to heap-based buffer overflows,were found in the way libxml2 handled documents that enable entityexpansion. A remote attacker could provide a large, specially-crafted XMLfile that, when opened in an application linked against libxml2, wouldcause the application to crash or, potentially, execute arbitrary code withthe privileges of the user running the application. (CVE-2012-2807)A one byte buffer overflow was found in the way libxml2 evaluated certainparts of XML Pointer Language (XPointer) expressions. A remote attackercould provide a specially-crafted XML file that, when opened in anapplication linked against libxml2, would cause the application to crashor, potentially, execute arbitrary code with the privileges of the userrunning the application. (CVE-2011-3102)All users of libxml2 are advised to upgrade to these updated packages,which contain backported patches to correct these issues. The desktop mustbe restarted (log out, then log back in) for this update to take effect.

Solution(s)

  • redhat-upgrade-libxml2
  • redhat-upgrade-libxml2-debuginfo
  • redhat-upgrade-libxml2-devel
  • redhat-upgrade-libxml2-python
  • redhat-upgrade-libxml2-static

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;