Debian DSA-3243-1 : libxml-libxml-perl - security update

medium Nessus Plugin ID 83192

Synopsis

The remote Debian host is missing a security-related update.

Description

Tilmann Haak from xing.com discovered that XML::LibXML, a Perl interface to the libxml2 library, did not respect the expand_entities parameter to disable processing of external entities in some circumstances. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.

Solution

Upgrade the libxml-libxml-perl packages.

For the oldstable distribution (wheezy), this problem has been fixed in version 2.0001+dfsg-1+deb7u1.

For the stable distribution (jessie), this problem has been fixed in version 2.0116+dfsg-1+deb8u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783443

https://packages.debian.org/source/wheezy/libxml-libxml-perl

https://packages.debian.org/source/jessie/libxml-libxml-perl

https://www.debian.org/security/2015/dsa-3243

Plugin Details

Severity: Medium

ID: 83192

File Name: debian_DSA-3243.nasl

Version: 2.7

Type: local

Agent: unix

Published: 5/4/2015

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libxml-libxml-perl, cpe:/o:debian:debian_linux:7.0, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 5/1/2015

Reference Information

CVE: CVE-2015-3451

BID: 74333

DSA: 3243