CVE-2010-4494

Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
References
Link Resource
http://code.google.com/p/chromium/issues/detail?id=63444 Exploit Issue Tracking Patch Vendor Advisory
http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0217.html Third Party Advisory
http://secunia.com/advisories/40775 Third Party Advisory
http://secunia.com/advisories/42472 Third Party Advisory
http://secunia.com/advisories/42721 Third Party Advisory
http://secunia.com/advisories/42762 Third Party Advisory
http://support.apple.com/kb/HT4554 Third Party Advisory
http://support.apple.com/kb/HT4564 Third Party Advisory
http://support.apple.com/kb/HT4566 Broken Link
http://support.apple.com/kb/HT4581 Third Party Advisory
http://www.debian.org/security/2010/dsa-2137 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:260 Third Party Advisory
http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1749.html Third Party Advisory
http://www.vupen.com/english/advisories/2010/3319 Third Party Advisory
http://www.vupen.com/english/advisories/2010/3336 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0230 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916 Third Party Advisory
http://code.google.com/p/chromium/issues/detail?id=63444 Exploit Issue Tracking Patch Vendor Advisory
http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0217.html Third Party Advisory
http://secunia.com/advisories/40775 Third Party Advisory
http://secunia.com/advisories/42472 Third Party Advisory
http://secunia.com/advisories/42721 Third Party Advisory
http://secunia.com/advisories/42762 Third Party Advisory
http://support.apple.com/kb/HT4554 Third Party Advisory
http://support.apple.com/kb/HT4564 Third Party Advisory
http://support.apple.com/kb/HT4566 Broken Link
http://support.apple.com/kb/HT4581 Third Party Advisory
http://www.debian.org/security/2010/dsa-2137 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:260 Third Party Advisory
http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-1749.html Third Party Advisory
http://www.vupen.com/english/advisories/2010/3319 Third Party Advisory
http://www.vupen.com/english/advisories/2010/3336 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0230 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:a:hp:insight_control_server_deployment:*:*:*:*:*:*:*:*
cpe:2.3:a:hp:rapid_deployment_pack:*:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://code.google.com/p/chromium/issues/detail?id=63444 - Exploit, Issue Tracking, Patch, Vendor Advisory () http://code.google.com/p/chromium/issues/detail?id=63444 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html - Mailing List, Third Party Advisory
References () http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html - Mailing List, Third Party Advisory
References () http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html - Mailing List, Third Party Advisory
References () http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - Mailing List, Third Party Advisory () http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0217.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0217.html - Third Party Advisory
References () http://secunia.com/advisories/40775 - Third Party Advisory () http://secunia.com/advisories/40775 - Third Party Advisory
References () http://secunia.com/advisories/42472 - Third Party Advisory () http://secunia.com/advisories/42472 - Third Party Advisory
References () http://secunia.com/advisories/42721 - Third Party Advisory () http://secunia.com/advisories/42721 - Third Party Advisory
References () http://secunia.com/advisories/42762 - Third Party Advisory () http://secunia.com/advisories/42762 - Third Party Advisory
References () http://support.apple.com/kb/HT4554 - Third Party Advisory () http://support.apple.com/kb/HT4554 - Third Party Advisory
References () http://support.apple.com/kb/HT4564 - Third Party Advisory () http://support.apple.com/kb/HT4564 - Third Party Advisory
References () http://support.apple.com/kb/HT4566 - Broken Link () http://support.apple.com/kb/HT4566 - Broken Link
References () http://support.apple.com/kb/HT4581 - Third Party Advisory () http://support.apple.com/kb/HT4581 - Third Party Advisory
References () http://www.debian.org/security/2010/dsa-2137 - Third Party Advisory () http://www.debian.org/security/2010/dsa-2137 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2010:260 - Third Party Advisory () http://www.mandriva.com/security/advisories?name=MDVSA-2010:260 - Third Party Advisory
References () http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html - Third Party Advisory () http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-1749.html - Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-1749.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2010/3319 - Third Party Advisory () http://www.vupen.com/english/advisories/2010/3319 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2010/3336 - Third Party Advisory () http://www.vupen.com/english/advisories/2010/3336 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2011/0230 - Third Party Advisory () http://www.vupen.com/english/advisories/2011/0230 - Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916 - Third Party Advisory

Information

Published : 2010-12-07 21:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4494

Mitre link : CVE-2010-4494

CVE.ORG link : CVE-2010-4494


JSON object : View

Products Affected

xmlsoft

  • libxml2

debian

  • debian_linux

hp

  • insight_control_server_deployment
  • rapid_deployment_pack

google

  • chrome

suse

  • suse_linux_enterprise_server

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server

apple

  • itunes
  • mac_os_x
  • safari
  • iphone_os

apache

  • openoffice

opensuse

  • opensuse

fedoraproject

  • fedora
CWE
CWE-415

Double Free