CVE-2011-1425

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

xslt.c in XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit and other products, when XSLT is enabled, allows remote attackers to create or overwrite arbitrary files via vectors involving the libxslt output extension and a ds:Transform element during signature verification.

References

http://git.gnome.org/browse/xmlsec/commit/?id=2d5eddcc4163ea050cf3a3a1a25452bb5124f780

http://git.gnome.org/browse/xmlsec/commit/?id=35eaacde6093d6711339754fc2146341b8b9f5fa

http://secunia.com/advisories/43920

http://secunia.com/advisories/44167

http://secunia.com/advisories/44423

http://trac.webkit.org/changeset/79159

http://www.aleksey.com/pipermail/xmlsec/2011/009120.html

http://www.debian.org/security/2011/dsa-2219

http://www.mandriva.com/security/advisories?name=MDVSA-2011:063

http://www.redhat.com/support/errata/RHSA-2011-0486.html

http://www.securityfocus.com/bid/47135

http://www.securitytracker.com/id?1025284

http://www.vupen.com/english/advisories/2011/0855

http://www.vupen.com/english/advisories/2011/0858

http://www.vupen.com/english/advisories/2011/1010

http://www.vupen.com/english/advisories/2011/1172

https://bugs.webkit.org/show_bug.cgi?id=52688

https://bugzilla.redhat.com/show_bug.cgi?id=692133

https://exchange.xforce.ibmcloud.com/vulnerabilities/66506

Details

Source: MITRE

Published: 2011-04-04

Updated: 2017-08-17

Type: CWE-264

Risk Information

CVSS v2

Base Score: 5.1

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 4.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:aleksey:xml_security_library:0.0.1:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.2:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.2a:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.3:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.4:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.5:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.6:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.7:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.8:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.9:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.10:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.11:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.12:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.13:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.14:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.0.15:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.10:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.11:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.13:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.14:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:1.2.15:*:*:*:*:*:*:*

cpe:2.3:a:aleksey:xml_security_library:*:*:*:*:*:*:*:* versions up to 1.2.16 (inclusive)

cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
79962GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011NessusGentoo Local Security Checks
critical
68269Oracle Linux 4 / 5 : xmlsec1 (ELSA-2011-0486)NessusOracle Linux Local Security Checks
medium
61032Scientific Linux Security Update : xmlsec1 on SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
53813CentOS 4 / 5 : xmlsec1 (CESA-2011:0486)NessusCentOS Local Security Checks
medium
53646RHEL 4 / 5 : xmlsec1 (RHSA-2011:0486)NessusRed Hat Local Security Checks
medium
53477Debian DSA-2219-1 : xmlsec1 - arbitrary file overwriteNessusDebian Local Security Checks
medium
53289Mandriva Linux Security Advisory : xmlsec1 (MDVSA-2011:063)NessusMandriva Local Security Checks
medium