Linux Security
    Linux Security
    Linux Security

    Debian: libxml/libxml2 Buffer overflow vulnerability

    Date 04 Mar 2004
    Posted By LinuxSecurity Advisories
    When fetching a remote resource via FTP or HTTP, the library uses special parsing routines which can overflow a buffer if passed a very long URL.
    Debian Security Advisory DSA 455-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    March 3rd, 2004                
    - --------------------------------------------------------------------------
    Package        : libxml, libxml2
    Vulnerability  : buffer overflows
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-0110
    libxml2 is a library for manipulating XML files.
    Yuuichi Teranishi discovered a flaw in libxml, the GNOME XML library.
    When fetching a remote resource via FTP or HTTP, the library uses
    special parsing routines which can overflow a buffer if passed a very
    long URL.  If an attacker is able to find an application using libxml1
    or libxml2 that parses remote resources and allows the attacker to
    craft the URL, then this flaw could be used to execute arbitrary code.
    For the stable distribution (woody) this problem has been fixed in
    version 1.8.17-2woody1 of libxml and version 2.4.19-4woody1 of libxml2.
    For the unstable distribution (sid) this problem has been fixed in
    version 1.8.17-5 of libxml and version 2.6.6-1 of libxml2.
    We recommend that you upgrade your libxml1 and libxml2 packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      651 16512f774479d73b7d82ca4e1db527f5
          Size/MD5 checksum:    33976 68afef27edf44d2b81e02fde3431bca8
          Size/MD5 checksum:  1016403 b8f01e43e1e03dec37dfd6b4507a9568
          Size/MD5 checksum:      654 6f56380f9bfade2c66f03956e1a65162
          Size/MD5 checksum:   344358 ba3ea49cc8c465ff1a6377780c35a45d
          Size/MD5 checksum:  1925487 22e3c043f57e18baaed86c5fff3eafbc
      Alpha architecture:
          Size/MD5 checksum:   381994 dc3ada5391f52bdfd642df1bc5b9a6be
          Size/MD5 checksum:   208830 a0698c267c722bf5127ee3709024ecc9
          Size/MD5 checksum:   388786 a4ece19b65c46dd0e8f889c26e5938b3
          Size/MD5 checksum:   938568 5f3e46bd132c9167db9e93ca3c739952
      ARM architecture:
          Size/MD5 checksum:   392536 9e126158928d24a562ae1d2b3d35ae1d
          Size/MD5 checksum:   184172 0527fd6a14e003139be9b475e689ee41
          Size/MD5 checksum:   346060 6b9caeac9a0061576f8a1e5b46ed8671
          Size/MD5 checksum:   902966 688fb8c5ea18b0f9d8e7671dad5426c5
      Intel IA-32 architecture:
          Size/MD5 checksum:   330042 b1c61849e10edbe597429fcd05d1d2b3
          Size/MD5 checksum:   183310 3c217f980c138f24eac1a0abd89eba78
          Size/MD5 checksum:   333034 11cfc7169e549c63dccf28f15300a8eb
          Size/MD5 checksum:   843084 43a242f53ed8a688e5ed02284a150f52
      Intel IA-64 architecture:
          Size/MD5 checksum:   447184 5bfa2835a9d9b43da6d31e1cadce6bc1
          Size/MD5 checksum:   285484 a378583eaaaf1248aba8de4fd721c5fc
          Size/MD5 checksum:   507452 b447844080f6e0c1d498b34ec849c9b2
          Size/MD5 checksum:  1032662 ddd7aae0835fe1edb04aee7cdf2e41c0
      HP Precision architecture:
          Size/MD5 checksum:   439372 d5f629dc7f885dd858671ab639d954f8
          Size/MD5 checksum:   248212 837ec145aac757ce053075a4736ddb55
          Size/MD5 checksum:   425454 0719d6e0835b6dae714b1ce1a0bd9d77
          Size/MD5 checksum:   979152 41e110f4c9805a5afb94fff79d1f3d22
      Motorola 680x0 architecture:
          Size/MD5 checksum:   318176 d0dcb654f8083e0873396d38aaa1a7a2
          Size/MD5 checksum:   178226 c18c0c7bb3c0884c62f36922e5843e83
          Size/MD5 checksum:   336902 2990a52db32dc3fd3108be4e677e59bf
          Size/MD5 checksum:   828820 6378b37494b667bce472f934f50c3cb8
      Big endian MIPS architecture:
          Size/MD5 checksum:   376266 1c226409e23047ec521224697a82f76c
          Size/MD5 checksum:   183628 0fa6098bdbfeadb50dfb7e5f4f2c967c
          Size/MD5 checksum:   348902 474e9b8bc026ca199218727203422c12
          Size/MD5 checksum:   921098 b8aa537054fc482ab042647ac0551f94
      Little endian MIPS architecture:
          Size/MD5 checksum:   373696 603708cf407ea49748c987bea0ddaade
          Size/MD5 checksum:   182958 5397950eb709142774a2aa70f5faa9db
          Size/MD5 checksum:   343660 985465f428571c774bb3b44699768c15
          Size/MD5 checksum:   915010 0553eb273d500c82b93cac55b7c52ad4
      PowerPC architecture:
          Size/MD5 checksum:   356590 f97bc218912092bae051188dd9c157d5
          Size/MD5 checksum:   194062 b37b9d75744323dafdc4a76293c3456d
          Size/MD5 checksum:   376486 bdfb8d5a839f65286e57e34857fd14f1
          Size/MD5 checksum:   916952 90f7f069508d26431cc61f967886b159
      IBM S/390 architecture:
          Size/MD5 checksum:   329398 2b6046a2aeb468a00abc8556676d10d1
          Size/MD5 checksum:   184216 78803336930258db2d7b115c4b708fad
          Size/MD5 checksum:   360282 a7bb4f832d6a4d86753b3d046f4e8fa1
          Size/MD5 checksum:   857396 e7efd1f4a92ba1f6a1a3c96e5c5a851b
      Sun Sparc architecture:
          Size/MD5 checksum:   347058 88ec785a5184e9ff44e617638b661be4
          Size/MD5 checksum:   196108 da3f13d8c4e4ffd8604cd01cf26c781f
          Size/MD5 checksum:   363670 ab415cd91562622e7ab2dde1df98a09b
          Size/MD5 checksum:   886976 ba693e42209a963c26f325d89ecbe989
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.