Linux Security
    Linux Security
    Linux Security

    Debian: libxml arbitrary code execution fix

    Date 02 Nov 2004
    Posted By LinuxSecurity Advisories
    "infamous41md" discovered several buffer overflows in libxml and libxml2, the XML C parser and toolkits for GNOME. Missing boundary checks could cause several buffers to be overflown, which may cause the client to execute arbitrary code.
    Debian Security Advisory DSA 582-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    November 2nd, 2004             
    Package        : libxml, libxml2
    Vulnerability  : buffer overflow
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-0989
    "infamous41md" discovered several buffer overflows in libxml and
    libxml2, the XML C parser and toolkits for GNOME.  Missing boundary
    checks could cause several buffers to be overflown, which may cause
    the client to execute arbitrary code.
    The following vulnerability matrix lists corrected versions of these
    For the stable distribution (woody) these problems have been fixed in
    version 1.8.17-2woody2 of libxml and in version 2.4.19-4woody2 of
    For the unstable distribution (sid) these problems have been fixed in
    version 1.8.17-9 of libxml and in version 2.6.11-5 of libxml2.
    These problems have also been fixed in version 2.6.15-1 of libxml2 in
    the experimental distribution.
    We recommend that you upgrade your libxml packages.
    Upgrade Instructions
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
      Source archives:
          Size/MD5 checksum:      651 2bfffaf40b3784b89a819e878e9626f0
          Size/MD5 checksum:    34182 6923b92252b9aed67167f04ab236c8e8
          Size/MD5 checksum:  1016403 b8f01e43e1e03dec37dfd6b4507a9568
          Size/MD5 checksum:      654 40c1984cb88763ebd8cc8bfe99de6c80
          Size/MD5 checksum:   344211 7189893e73c9d929205896437c1b1da4
          Size/MD5 checksum:  1925487 22e3c043f57e18baaed86c5fff3eafbc
      Alpha architecture:
          Size/MD5 checksum:   382124 e44313692381e5858f18da6c49d05513
          Size/MD5 checksum:   208956 83b71540e2c73f03513975b0fb8b105f
          Size/MD5 checksum:   388892 0c563e7f9514b655a12aa2d064223032
          Size/MD5 checksum:   938660 dadea3ca7e50350c2c7ffebe36d05d0f
      ARM architecture:
          Size/MD5 checksum:   392650 9e63519f4811e4ecfe15c9d918b38a3b
          Size/MD5 checksum:   184316 679269786787b9e5acbaedebff18adb7
          Size/MD5 checksum:   346200 803c66b523b9808d15528d54c060a9bd
          Size/MD5 checksum:   903098 ee22dbc5b403a6e652efe7f15a01fb75
      Intel IA-32 architecture:
          Size/MD5 checksum:   330182 1170064a71b1a4e9b74816af4a32475e
          Size/MD5 checksum:   183476 fd63fcad152cfce33e4b1704522ad550
          Size/MD5 checksum:   333104 16c4091c3a23b0e781f56dc319618f8e
          Size/MD5 checksum:   843196 239c8e4e112dbda6b3c2cd31f8177720
      Intel IA-64 architecture:
          Size/MD5 checksum:   447364 893b7b074f5fa81d5b5c9e26000b29f3
          Size/MD5 checksum:   285628 879fc3aef1b51620f7e6915292d6a97e
          Size/MD5 checksum:   507612 a9adbdfd156d3fe84040f408ad125be2
          Size/MD5 checksum:  1032762 8d6f6d5d16b2d75bfd76672fa4985a14
      HP Precision architecture:
          Size/MD5 checksum:   439590 425399c89c7eb16137d969a6cef752e4
          Size/MD5 checksum:   248372 9caf0fcecb21d78d9af74f632b1c8446
          Size/MD5 checksum:   425520 3ccebdce5fe9b80743253a37316157af
          Size/MD5 checksum:   979256 6c22748c33c75b0ee5aeb860efee5a53
      Motorola 680x0 architecture:
          Size/MD5 checksum:   318372 0fab68e9e9ba8a2e997573117e9aa0e9
          Size/MD5 checksum:   178346 4b8cc510bb6437ce8db345eca1839af2
          Size/MD5 checksum:   337140 82169ea40ae52a9e8d3156a31e360955
          Size/MD5 checksum:   828952 4ca7a3f1c179596e437f9dfdcc3f580a
      Big endian MIPS architecture:
          Size/MD5 checksum:   376408 365aeb51b9294d81730bc98e0af0d219
          Size/MD5 checksum:   183804 5570e2a54ba089d1f1d8b02c56742089
          Size/MD5 checksum:   349116 6ca2c1d1d79d7333a22406b179c092db
          Size/MD5 checksum:   921192 ebb90411abef3e858b9de4a3be497c46
      Little endian MIPS architecture:
          Size/MD5 checksum:   373854 692fbe719929a2874dae659d41bdc77a
          Size/MD5 checksum:   183140 e723329953c4a18985f3e7ccd594527d
          Size/MD5 checksum:   343810 96a05292b67bfb88b0b297462511633d
          Size/MD5 checksum:   915238 65471cbe63f97759b77cc6909f3e4068
      PowerPC architecture:
          Size/MD5 checksum:   356772 b9d81bed922444e04b4bb40cd8b6c1da
          Size/MD5 checksum:   194196 5bfd2a792665ff67ee95580978cbb190
          Size/MD5 checksum:   376604 83bdc195dd946e4f91912e7147ebe903
          Size/MD5 checksum:   917092 61479b1fa13b124a920cceae7e23992a
      IBM S/390 architecture:
          Size/MD5 checksum:   329590 72c14a9b31961174f71af876ddcd53eb
          Size/MD5 checksum:   184392 93eaedce11e29de34f4e4cf7d07a40df
          Size/MD5 checksum:   360384 31084d770e8129aa710513ef56aeb41d
          Size/MD5 checksum:   857550 6e3186b4f4e81af40390dac27dd0fe2f
      Sun Sparc architecture:
          Size/MD5 checksum:   347208 5984047996c0c1bfe1bda0813e62f905
          Size/MD5 checksum:   196282 3214ecae98a445d78aae0aa850403df4
          Size/MD5 checksum:   363778 0e6054a515784befb193b4d331f399d5
          Size/MD5 checksum:   887178 8ca21974d081b2dd39b1e78dca414547
      These files will probably be moved into the stable distribution on
      its next update.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"12","type":"x","order":"1","pct":36.36,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.18,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":45.45,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.