Mandriva Linux Security Advisory : libxml2 (MDVSA-2013:198)

medium Nessus Plugin ID 69053

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been discovered and corrected in libxml2 :

A denial of service flaw was found in the way libxml2, a library providing support to read, modify and write XML and HTML files, performed string substitutions when entity values for external entity references replacement (--noent option) was requested / enabled during the XML file parsing. A remote attacker could provide a specially crafted XML file containing an external entity expansion, when processed would lead to excessive CPU consumption (denial of service) (CVE-2013-0339). This a different flaw from CVE-2013-0338.

parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state (CVE-2013-2877).

The updated packages have been patched to correct these issues.

Solution

Update the affected packages.

See Also

http://advisories.mageia.org/MGASA-2013-0218.html

https://bugzilla.redhat.com/show_bug.cgi?id=915149

https://bugzilla.redhat.com/show_bug.cgi?id=983204

Plugin Details

Severity: Medium

ID: 69053

File Name: mandriva_MDVSA-2013-198.nasl

Version: 1.16

Type: local

Published: 7/25/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64xml2-devel, p-cpe:/a:mandriva:linux:lib64xml2_2, p-cpe:/a:mandriva:linux:libxml2-python, p-cpe:/a:mandriva:linux:libxml2-utils, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/24/2013

Reference Information

CVE: CVE-2013-0339, CVE-2013-2877

BID: 59000, 61050

MDVSA: 2013:198