CVE-2013-1969

HIGH

Description

Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.

References

http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html

http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html

http://secunia.com/advisories/53061

http://www.openwall.com/lists/oss-security/2013/04/17/4

http://www.openwall.com/lists/oss-security/2013/04/19/1

http://www.ubuntu.com/usn/USN-1817-1

https://bugzilla.gnome.org/show_bug.cgi?id=690202

https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f

Details

Source: MITRE

Published: 2013-04-25

Updated: 2013-06-21

Type: CWE-399

Risk Information

CVSS v2.0

Base Score: 7.5

Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH