CVE-2008-3281

libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html Mailing List
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Broken Link Mailing List
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html Mailing List
http://lists.vmware.com/pipermail/security-announce/2008/000039.html Broken Link
http://mail.gnome.org/archives/xml/2008-August/msg00034.html Mailing List Patch
http://secunia.com/advisories/31558 Broken Link
http://secunia.com/advisories/31566 Broken Link
http://secunia.com/advisories/31590 Broken Link
http://secunia.com/advisories/31728 Broken Link
http://secunia.com/advisories/31748 Broken Link
http://secunia.com/advisories/31855 Broken Link
http://secunia.com/advisories/31982 Broken Link
http://secunia.com/advisories/32488 Broken Link
http://secunia.com/advisories/32807 Broken Link
http://secunia.com/advisories/32974 Broken Link
http://secunia.com/advisories/35379 Broken Link
http://security.gentoo.org/glsa/glsa-200812-06.xml Third Party Advisory
http://support.apple.com/kb/HT3613 Third Party Advisory
http://support.apple.com/kb/HT3639 Third Party Advisory
http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772 Broken Link
http://wiki.rpath.com/Advisories:rPSA-2008-0325 Broken Link
http://www.debian.org/security/2008/dsa-1631 Mailing List Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:180 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:192 Broken Link
http://www.securityfocus.com/archive/1/497962/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30783 Broken Link Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020728 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-640-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2008-0017.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/2419 Broken Link
http://www.vupen.com/english/advisories/2008/2843 Broken Link
http://www.vupen.com/english/advisories/2008/2971 Broken Link
http://www.vupen.com/english/advisories/2009/1522 Broken Link
http://www.vupen.com/english/advisories/2009/1621 Broken Link
http://xmlsoft.org/news.html Release Notes
https://bugzilla.redhat.com/show_bug.cgi?id=458086 Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 Broken Link
https://rhn.redhat.com/errata/RHSA-2008-0836.html Third Party Advisory
https://usn.ubuntu.com/644-1/ Broken Link
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html Mailing List
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html Mailing List
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Broken Link Mailing List
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html Mailing List
http://lists.vmware.com/pipermail/security-announce/2008/000039.html Broken Link
http://mail.gnome.org/archives/xml/2008-August/msg00034.html Mailing List Patch
http://secunia.com/advisories/31558 Broken Link
http://secunia.com/advisories/31566 Broken Link
http://secunia.com/advisories/31590 Broken Link
http://secunia.com/advisories/31728 Broken Link
http://secunia.com/advisories/31748 Broken Link
http://secunia.com/advisories/31855 Broken Link
http://secunia.com/advisories/31982 Broken Link
http://secunia.com/advisories/32488 Broken Link
http://secunia.com/advisories/32807 Broken Link
http://secunia.com/advisories/32974 Broken Link
http://secunia.com/advisories/35379 Broken Link
http://security.gentoo.org/glsa/glsa-200812-06.xml Third Party Advisory
http://support.apple.com/kb/HT3613 Third Party Advisory
http://support.apple.com/kb/HT3639 Third Party Advisory
http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772 Broken Link
http://wiki.rpath.com/Advisories:rPSA-2008-0325 Broken Link
http://www.debian.org/security/2008/dsa-1631 Mailing List Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:180 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2008:192 Broken Link
http://www.securityfocus.com/archive/1/497962/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/30783 Broken Link Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020728 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-640-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2008-0017.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/2419 Broken Link
http://www.vupen.com/english/advisories/2008/2843 Broken Link
http://www.vupen.com/english/advisories/2008/2971 Broken Link
http://www.vupen.com/english/advisories/2009/1522 Broken Link
http://www.vupen.com/english/advisories/2009/1621 Broken Link
http://xmlsoft.org/news.html Release Notes
https://bugzilla.redhat.com/show_bug.cgi?id=458086 Issue Tracking
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 Broken Link
https://rhn.redhat.com/errata/RHSA-2008-0836.html Third Party Advisory
https://usn.ubuntu.com/644-1/ Broken Link
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html Mailing List
Configurations

Configuration 1 (hide)

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List
References () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List
References () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html - Mailing List
References () http://lists.vmware.com/pipermail/security-announce/2008/000039.html - Broken Link () http://lists.vmware.com/pipermail/security-announce/2008/000039.html - Broken Link
References () http://mail.gnome.org/archives/xml/2008-August/msg00034.html - Mailing List, Patch () http://mail.gnome.org/archives/xml/2008-August/msg00034.html - Mailing List, Patch
References () http://secunia.com/advisories/31558 - Broken Link () http://secunia.com/advisories/31558 - Broken Link
References () http://secunia.com/advisories/31566 - Broken Link () http://secunia.com/advisories/31566 - Broken Link
References () http://secunia.com/advisories/31590 - Broken Link () http://secunia.com/advisories/31590 - Broken Link
References () http://secunia.com/advisories/31728 - Broken Link () http://secunia.com/advisories/31728 - Broken Link
References () http://secunia.com/advisories/31748 - Broken Link () http://secunia.com/advisories/31748 - Broken Link
References () http://secunia.com/advisories/31855 - Broken Link () http://secunia.com/advisories/31855 - Broken Link
References () http://secunia.com/advisories/31982 - Broken Link () http://secunia.com/advisories/31982 - Broken Link
References () http://secunia.com/advisories/32488 - Broken Link () http://secunia.com/advisories/32488 - Broken Link
References () http://secunia.com/advisories/32807 - Broken Link () http://secunia.com/advisories/32807 - Broken Link
References () http://secunia.com/advisories/32974 - Broken Link () http://secunia.com/advisories/32974 - Broken Link
References () http://secunia.com/advisories/35379 - Broken Link () http://secunia.com/advisories/35379 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200812-06.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200812-06.xml - Third Party Advisory
References () http://support.apple.com/kb/HT3613 - Third Party Advisory () http://support.apple.com/kb/HT3613 - Third Party Advisory
References () http://support.apple.com/kb/HT3639 - Third Party Advisory () http://support.apple.com/kb/HT3639 - Third Party Advisory
References () http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772 - Broken Link () http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772 - Broken Link
References () http://wiki.rpath.com/Advisories:rPSA-2008-0325 - Broken Link () http://wiki.rpath.com/Advisories:rPSA-2008-0325 - Broken Link
References () http://www.debian.org/security/2008/dsa-1631 - Mailing List, Third Party Advisory () http://www.debian.org/security/2008/dsa-1631 - Mailing List, Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:180 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2008:180 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:192 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2008:192 - Broken Link
References () http://www.securityfocus.com/archive/1/497962/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/497962/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/30783 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/30783 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1020728 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1020728 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-640-1 - Third Party Advisory () http://www.ubuntu.com/usn/usn-640-1 - Third Party Advisory
References () http://www.vmware.com/security/advisories/VMSA-2008-0017.html - Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2008-0017.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2008/2419 - Broken Link () http://www.vupen.com/english/advisories/2008/2419 - Broken Link
References () http://www.vupen.com/english/advisories/2008/2843 - Broken Link () http://www.vupen.com/english/advisories/2008/2843 - Broken Link
References () http://www.vupen.com/english/advisories/2008/2971 - Broken Link () http://www.vupen.com/english/advisories/2008/2971 - Broken Link
References () http://www.vupen.com/english/advisories/2009/1522 - Broken Link () http://www.vupen.com/english/advisories/2009/1522 - Broken Link
References () http://www.vupen.com/english/advisories/2009/1621 - Broken Link () http://www.vupen.com/english/advisories/2009/1621 - Broken Link
References () http://xmlsoft.org/news.html - Release Notes () http://xmlsoft.org/news.html - Release Notes
References () https://bugzilla.redhat.com/show_bug.cgi?id=458086 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=458086 - Issue Tracking
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 - Broken Link
References () https://rhn.redhat.com/errata/RHSA-2008-0836.html - Third Party Advisory () https://rhn.redhat.com/errata/RHSA-2008-0836.html - Third Party Advisory
References () https://usn.ubuntu.com/644-1/ - Broken Link () https://usn.ubuntu.com/644-1/ - Broken Link
References () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html - Mailing List () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html - Mailing List
References () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html - Mailing List () https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html - Mailing List

02 Feb 2024, 15:02

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/31590 - (SECUNIA) http://secunia.com/advisories/31590 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2008/2971 - (VUPEN) http://www.vupen.com/english/advisories/2008/2971 - Broken Link
References (SECUNIA) http://secunia.com/advisories/31566 - (SECUNIA) http://secunia.com/advisories/31566 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2008/2419 - (VUPEN) http://www.vupen.com/english/advisories/2008/2419 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200812-06.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200812-06.xml - Third Party Advisory
References (APPLE) http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - (APPLE) http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2008/2843 - (VUPEN) http://www.vupen.com/english/advisories/2008/2843 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/497962/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/497962/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (UBUNTU) https://usn.ubuntu.com/644-1/ - (UBUNTU) https://usn.ubuntu.com/644-1/ - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - (APPLE) http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=458086 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=458086 - Issue Tracking
References (SECTRACK) http://www.securitytracker.com/id?1020728 - (SECTRACK) http://www.securitytracker.com/id?1020728 - Broken Link, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/30783 - Patch (BID) http://www.securityfocus.com/bid/30783 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (CONFIRM) http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772 - (CONFIRM) http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/1522 - (VUPEN) http://www.vupen.com/english/advisories/2009/1522 - Broken Link
References (DEBIAN) http://www.debian.org/security/2008/dsa-1631 - (DEBIAN) http://www.debian.org/security/2008/dsa-1631 - Mailing List, Third Party Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/31855 - (SECUNIA) http://secunia.com/advisories/31855 - Broken Link
References (SECUNIA) http://secunia.com/advisories/32974 - (SECUNIA) http://secunia.com/advisories/32974 - Broken Link
References (SECUNIA) http://secunia.com/advisories/32488 - (SECUNIA) http://secunia.com/advisories/32488 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35379 - (SECUNIA) http://secunia.com/advisories/35379 - Broken Link
References (CONFIRM) http://support.apple.com/kb/HT3639 - (CONFIRM) http://support.apple.com/kb/HT3639 - Third Party Advisory
References (REDHAT) https://rhn.redhat.com/errata/RHSA-2008-0836.html - (REDHAT) https://rhn.redhat.com/errata/RHSA-2008-0836.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/32807 - (SECUNIA) http://secunia.com/advisories/32807 - Broken Link
References (SECUNIA) http://secunia.com/advisories/31748 - (SECUNIA) http://secunia.com/advisories/31748 - Broken Link
References (MISC) http://www.vmware.com/security/advisories/VMSA-2008-0017.html - (MISC) http://www.vmware.com/security/advisories/VMSA-2008-0017.html - Third Party Advisory
References (MLIST) http://mail.gnome.org/archives/xml/2008-August/msg00034.html - Exploit (MLIST) http://mail.gnome.org/archives/xml/2008-August/msg00034.html - Mailing List, Patch
References (SECUNIA) http://secunia.com/advisories/31982 - (SECUNIA) http://secunia.com/advisories/31982 - Broken Link
References (SECUNIA) http://secunia.com/advisories/31558 - (SECUNIA) http://secunia.com/advisories/31558 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html - Mailing List
References (UBUNTU) http://www.ubuntu.com/usn/usn-640-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-640-1 - Third Party Advisory
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html - Mailing List
References (MLIST) http://lists.vmware.com/pipermail/security-announce/2008/000039.html - (MLIST) http://lists.vmware.com/pipermail/security-announce/2008/000039.html - Broken Link
References (CONFIRM) http://wiki.rpath.com/Advisories:rPSA-2008-0325 - (CONFIRM) http://wiki.rpath.com/Advisories:rPSA-2008-0325 - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496 - Broken Link
References (SECUNIA) http://secunia.com/advisories/31728 - (SECUNIA) http://secunia.com/advisories/31728 - Broken Link
References (CONFIRM) http://support.apple.com/kb/HT3613 - (CONFIRM) http://support.apple.com/kb/HT3613 - Third Party Advisory
References (CONFIRM) http://xmlsoft.org/news.html - (CONFIRM) http://xmlsoft.org/news.html - Release Notes
References (VUPEN) http://www.vupen.com/english/advisories/2009/1621 - (VUPEN) http://www.vupen.com/english/advisories/2009/1621 - Broken Link
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:192 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:192 - Broken Link
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:180 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:180 - Broken Link
CPE cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:4.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.2:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:2.5.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*
CWE CWE-399 CWE-776
First Time Apple iphone Os
Canonical
Canonical ubuntu Linux
Redhat enterprise Linux Server
Debian
Redhat enterprise Linux Eus
Apple
Redhat enterprise Linux Workstation
Apple safari
Redhat enterprise Linux Desktop
Debian debian Linux
Redhat
Vmware esx
Fedoraproject fedora
Fedoraproject
Vmware
CVSS v2 : 4.3
v3 : unknown
v2 : 4.3
v3 : 6.5

Information

Published : 2008-08-27 20:41

Updated : 2024-11-21 00:48


NVD link : CVE-2008-3281

Mitre link : CVE-2008-3281

CVE.ORG link : CVE-2008-3281


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_workstation

xmlsoft

  • libxml2

canonical

  • ubuntu_linux

apple

  • iphone_os
  • safari

vmware

  • esx

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')