Debian Security Advisory DSA 455-1                     security@debian.org 
Debian -- Security Information                              Martin Schulze
March 3rd, 2004                          Debian -- Debian security FAQ 
- --------------------------------------------------------------------------

Package        : libxml, libxml2
Vulnerability  : buffer overflows
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0110

libxml2 is a library for manipulating XML files.

Yuuichi Teranishi discovered a flaw in libxml, the GNOME XML library.
When fetching a remote resource via FTP or HTTP, the library uses
special parsing routines which can overflow a buffer if passed a very
long URL.  If an attacker is able to find an application using libxml1
or libxml2 that parses remote resources and allows the attacker to
craft the URL, then this flaw could be used to execute arbitrary code.

For the stable distribution (woody) this problem has been fixed in
version 1.8.17-2woody1 of libxml and version 2.4.19-4woody1 of libxml2.

For the unstable distribution (sid) this problem has been fixed in
version 1.8.17-5 of libxml and version 2.6.6-1 of libxml2.

We recommend that you upgrade your libxml1 and libxml2 packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

      
      Size/MD5 checksum:      651 16512f774479d73b7d82ca4e1db527f5
      
      Size/MD5 checksum:    33976 68afef27edf44d2b81e02fde3431bca8
      
      Size/MD5 checksum:  1016403 b8f01e43e1e03dec37dfd6b4507a9568

      
      Size/MD5 checksum:      654 6f56380f9bfade2c66f03956e1a65162
      
      Size/MD5 checksum:   344358 ba3ea49cc8c465ff1a6377780c35a45d
      
      Size/MD5 checksum:  1925487 22e3c043f57e18baaed86c5fff3eafbc

  Alpha architecture:

      
      Size/MD5 checksum:   381994 dc3ada5391f52bdfd642df1bc5b9a6be
      
      Size/MD5 checksum:   208830 a0698c267c722bf5127ee3709024ecc9

      
      Size/MD5 checksum:   388786 a4ece19b65c46dd0e8f889c26e5938b3
      
      Size/MD5 checksum:   938568 5f3e46bd132c9167db9e93ca3c739952

  ARM architecture:

      
      Size/MD5 checksum:   392536 9e126158928d24a562ae1d2b3d35ae1d
      
      Size/MD5 checksum:   184172 0527fd6a14e003139be9b475e689ee41

      
      Size/MD5 checksum:   346060 6b9caeac9a0061576f8a1e5b46ed8671
      
      Size/MD5 checksum:   902966 688fb8c5ea18b0f9d8e7671dad5426c5

  Intel IA-32 architecture:

      
      Size/MD5 checksum:   330042 b1c61849e10edbe597429fcd05d1d2b3
      
      Size/MD5 checksum:   183310 3c217f980c138f24eac1a0abd89eba78

      
      Size/MD5 checksum:   333034 11cfc7169e549c63dccf28f15300a8eb
      
      Size/MD5 checksum:   843084 43a242f53ed8a688e5ed02284a150f52

  Intel IA-64 architecture:

      
      Size/MD5 checksum:   447184 5bfa2835a9d9b43da6d31e1cadce6bc1
      
      Size/MD5 checksum:   285484 a378583eaaaf1248aba8de4fd721c5fc

      
      Size/MD5 checksum:   507452 b447844080f6e0c1d498b34ec849c9b2
      
      Size/MD5 checksum:  1032662 ddd7aae0835fe1edb04aee7cdf2e41c0

  HP Precision architecture:

      
      Size/MD5 checksum:   439372 d5f629dc7f885dd858671ab639d954f8
      
      Size/MD5 checksum:   248212 837ec145aac757ce053075a4736ddb55

      
      Size/MD5 checksum:   425454 0719d6e0835b6dae714b1ce1a0bd9d77
      
      Size/MD5 checksum:   979152 41e110f4c9805a5afb94fff79d1f3d22

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:   318176 d0dcb654f8083e0873396d38aaa1a7a2
      
      Size/MD5 checksum:   178226 c18c0c7bb3c0884c62f36922e5843e83

      
      Size/MD5 checksum:   336902 2990a52db32dc3fd3108be4e677e59bf
      
      Size/MD5 checksum:   828820 6378b37494b667bce472f934f50c3cb8

  Big endian MIPS architecture:

      
      Size/MD5 checksum:   376266 1c226409e23047ec521224697a82f76c
      
      Size/MD5 checksum:   183628 0fa6098bdbfeadb50dfb7e5f4f2c967c

      
      Size/MD5 checksum:   348902 474e9b8bc026ca199218727203422c12
      
      Size/MD5 checksum:   921098 b8aa537054fc482ab042647ac0551f94

  Little endian MIPS architecture:

      
      Size/MD5 checksum:   373696 603708cf407ea49748c987bea0ddaade
      
      Size/MD5 checksum:   182958 5397950eb709142774a2aa70f5faa9db

      
      Size/MD5 checksum:   343660 985465f428571c774bb3b44699768c15
      
      Size/MD5 checksum:   915010 0553eb273d500c82b93cac55b7c52ad4

  PowerPC architecture:

      
      Size/MD5 checksum:   356590 f97bc218912092bae051188dd9c157d5
      
      Size/MD5 checksum:   194062 b37b9d75744323dafdc4a76293c3456d

      
      Size/MD5 checksum:   376486 bdfb8d5a839f65286e57e34857fd14f1
      
      Size/MD5 checksum:   916952 90f7f069508d26431cc61f967886b159

  IBM S/390 architecture:

      
      Size/MD5 checksum:   329398 2b6046a2aeb468a00abc8556676d10d1
      
      Size/MD5 checksum:   184216 78803336930258db2d7b115c4b708fad

      
      Size/MD5 checksum:   360282 a7bb4f832d6a4d86753b3d046f4e8fa1
      
      Size/MD5 checksum:   857396 e7efd1f4a92ba1f6a1a3c96e5c5a851b

  Sun Sparc architecture:

      
      Size/MD5 checksum:   347058 88ec785a5184e9ff44e617638b661be4
      
      Size/MD5 checksum:   196108 da3f13d8c4e4ffd8604cd01cf26c781f

      
      Size/MD5 checksum:   363670 ab415cd91562622e7ab2dde1df98a09b
      
      Size/MD5 checksum:   886976 ba693e42209a963c26f325d89ecbe989

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: libxml/libxml2 Buffer overflow vulnerability

March 4, 2004
When fetching a remote resource via FTP or HTTP, the library uses special parsing routines which can overflow a buffer if passed a very long URL.

Summary

libxml2 is a library for manipulating XML files.

Yuuichi Teranishi discovered a flaw in libxml, the GNOME XML library.
When fetching a remote resource via FTP or HTTP, the library uses
special parsing routines which can overflow a buffer if passed a very
long URL. If an attacker is able to find an application using libxml1
or libxml2 that parses remote resources and allows the attacker to
craft the URL, then this flaw could be used to execute arbitrary code.

For the stable distribution (woody) this problem has been fixed in
version 1.8.17-2woody1 of libxml and version 2.4.19-4woody1 of libxml2.

For the unstable distribution (sid) this problem has been fixed in
version 1.8.17-5 of libxml and version 2.6.6-1 of libxml2.

We recommend that you upgrade your libxml1 and libxml2 packages.


Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody

Source archives:


Size/MD5 checksum: 651 16512f774479d73b7d82ca4e1db527f5

Size/MD5 checksum: 33976 68afef27edf44d2b81e02fde3431bca8

Size/MD5 checksum: 1016403 b8f01e43e1e03dec37dfd6b4507a9568


Size/MD5 checksum: 654 6f56380f9bfade2c66f03956e1a65162

Size/MD5 checksum: 344358 ba3ea49cc8c465ff1a6377780c35a45d

Size/MD5 checksum: 1925487 22e3c043f57e18baaed86c5fff3eafbc

Alpha architecture:


Size/MD5 checksum: 381994 dc3ada5391f52bdfd642df1bc5b9a6be

Size/MD5 checksum: 208830 a0698c267c722bf5127ee3709024ecc9


Size/MD5 checksum: 388786 a4ece19b65c46dd0e8f889c26e5938b3

Size/MD5 checksum: 938568 5f3e46bd132c9167db9e93ca3c739952

ARM architecture:


Size/MD5 checksum: 392536 9e126158928d24a562ae1d2b3d35ae1d

Size/MD5 checksum: 184172 0527fd6a14e003139be9b475e689ee41


Size/MD5 checksum: 346060 6b9caeac9a0061576f8a1e5b46ed8671

Size/MD5 checksum: 902966 688fb8c5ea18b0f9d8e7671dad5426c5

Intel IA-32 architecture:


Size/MD5 checksum: 330042 b1c61849e10edbe597429fcd05d1d2b3

Size/MD5 checksum: 183310 3c217f980c138f24eac1a0abd89eba78


Size/MD5 checksum: 333034 11cfc7169e549c63dccf28f15300a8eb

Size/MD5 checksum: 843084 43a242f53ed8a688e5ed02284a150f52

Intel IA-64 architecture:


Size/MD5 checksum: 447184 5bfa2835a9d9b43da6d31e1cadce6bc1

Size/MD5 checksum: 285484 a378583eaaaf1248aba8de4fd721c5fc


Size/MD5 checksum: 507452 b447844080f6e0c1d498b34ec849c9b2

Size/MD5 checksum: 1032662 ddd7aae0835fe1edb04aee7cdf2e41c0

HP Precision architecture:


Size/MD5 checksum: 439372 d5f629dc7f885dd858671ab639d954f8

Size/MD5 checksum: 248212 837ec145aac757ce053075a4736ddb55


Size/MD5 checksum: 425454 0719d6e0835b6dae714b1ce1a0bd9d77

Size/MD5 checksum: 979152 41e110f4c9805a5afb94fff79d1f3d22

Motorola 680x0 architecture:


Size/MD5 checksum: 318176 d0dcb654f8083e0873396d38aaa1a7a2

Size/MD5 checksum: 178226 c18c0c7bb3c0884c62f36922e5843e83


Size/MD5 checksum: 336902 2990a52db32dc3fd3108be4e677e59bf

Size/MD5 checksum: 828820 6378b37494b667bce472f934f50c3cb8

Big endian MIPS architecture:


Size/MD5 checksum: 376266 1c226409e23047ec521224697a82f76c

Size/MD5 checksum: 183628 0fa6098bdbfeadb50dfb7e5f4f2c967c


Size/MD5 checksum: 348902 474e9b8bc026ca199218727203422c12

Size/MD5 checksum: 921098 b8aa537054fc482ab042647ac0551f94

Little endian MIPS architecture:


Size/MD5 checksum: 373696 603708cf407ea49748c987bea0ddaade

Size/MD5 checksum: 182958 5397950eb709142774a2aa70f5faa9db


Size/MD5 checksum: 343660 985465f428571c774bb3b44699768c15

Size/MD5 checksum: 915010 0553eb273d500c82b93cac55b7c52ad4

PowerPC architecture:


Size/MD5 checksum: 356590 f97bc218912092bae051188dd9c157d5

Size/MD5 checksum: 194062 b37b9d75744323dafdc4a76293c3456d


Size/MD5 checksum: 376486 bdfb8d5a839f65286e57e34857fd14f1

Size/MD5 checksum: 916952 90f7f069508d26431cc61f967886b159

IBM S/390 architecture:


Size/MD5 checksum: 329398 2b6046a2aeb468a00abc8556676d10d1

Size/MD5 checksum: 184216 78803336930258db2d7b115c4b708fad


Size/MD5 checksum: 360282 a7bb4f832d6a4d86753b3d046f4e8fa1

Size/MD5 checksum: 857396 e7efd1f4a92ba1f6a1a3c96e5c5a851b

Sun Sparc architecture:


Size/MD5 checksum: 347058 88ec785a5184e9ff44e617638b661be4

Size/MD5 checksum: 196108 da3f13d8c4e4ffd8604cd01cf26c781f


Size/MD5 checksum: 363670 ab415cd91562622e7ab2dde1df98a09b

Size/MD5 checksum: 886976 ba693e42209a963c26f325d89ecbe989

These files will probably be moved into the stable distribution on
its next revision.

For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/



Severity
Package : libxml, libxml2
Vulnerability : buffer overflows
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2004-0110

Related News