Debian DSA-1654-1 : libxml2 - buffer overflow

critical Nessus Plugin ID 34415

Synopsis

The remote Debian host is missing a security-related update.

Description

It was discovered that libxml2, the GNOME XML library, didn't correctly handle long entity names. This could allow the execution of arbitrary code via a malicious XML file.

Solution

Upgrade the libxml2 package.

For the stable distribution (etch), this problem has been fixed in version 2.6.27.dfsg-5.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=498768

https://www.debian.org/security/2008/dsa-1654

Plugin Details

Severity: Critical

ID: 34415

File Name: debian_DSA-1654.nasl

Version: 1.12

Type: local

Agent: unix

Published: 10/15/2008

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libxml2, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 10/14/2008

Reference Information

CVE: CVE-2008-3529

DSA: 1654

CWE: 119