FreeBSD : libxml2 -- two vulnerabilities (d71da236-9a94-11dd-8f42-001c2514716c)

critical Nessus Plugin ID 34416


The remote FreeBSD host is missing a security-related update.


Secunia reports :

Two vulnerabilities have been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

1) A recursion error exists when processing certain XML content. This can be exploited to e.g. exhaust all available memory and CPU resources by tricking an application using Libxml2 into processing specially crafted XML documents.

2) A boundary error in the processing of long XML entity names in parser.c can be exploited to cause a heap-based buffer overflow when specially crafted XML content is parsed.

Successful exploitation may allow execution of arbitrary code.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 34416

File Name: freebsd_pkg_d71da2369a9411dd8f42001c2514716c.nasl

Version: 1.17

Type: local

Published: 10/15/2008

Updated: 1/6/2021

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:libxml2, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/15/2008

Vulnerability Publication Date: 8/22/2008

Reference Information

CVE: CVE-2008-3281, CVE-2008-3529

CWE: 119, 399