CVE-2012-5134

Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
References
Link Resource
http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
http://rhn.redhat.com/errata/RHSA-2012-1512.html
http://rhn.redhat.com/errata/RHSA-2013-0217.html
http://secunia.com/advisories/51448
http://secunia.com/advisories/54886
http://secunia.com/advisories/55568
http://support.apple.com/kb/HT5934
http://support.apple.com/kb/HT6001
http://www.debian.org/security/2012/dsa-2580
http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
http://www.securityfocus.com/bid/56684
http://www.securitytracker.com/id?1027815
http://www.ubuntu.com/usn/USN-1656-1
https://bugzilla.redhat.com/show_bug.cgi?id=880466
https://code.google.com/p/chromium/issues/detail?id=158249
https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
http://rhn.redhat.com/errata/RHSA-2012-1512.html
http://rhn.redhat.com/errata/RHSA-2013-0217.html
http://secunia.com/advisories/51448
http://secunia.com/advisories/54886
http://secunia.com/advisories/55568
http://support.apple.com/kb/HT5934
http://support.apple.com/kb/HT6001
http://www.debian.org/security/2012/dsa-2580
http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
http://www.securityfocus.com/bid/56684
http://www.securitytracker.com/id?1027815
http://www.ubuntu.com/usn/USN-1656-1
https://bugzilla.redhat.com/show_bug.cgi?id=880466
https://code.google.com/p/chromium/issues/detail?id=158249
https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d - () http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d -
References () http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html - () http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html -
References () http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html - () http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html -
References () http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html - () http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1512.html - () http://rhn.redhat.com/errata/RHSA-2012-1512.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0217.html - () http://rhn.redhat.com/errata/RHSA-2013-0217.html -
References () http://secunia.com/advisories/51448 - () http://secunia.com/advisories/51448 -
References () http://secunia.com/advisories/54886 - () http://secunia.com/advisories/54886 -
References () http://secunia.com/advisories/55568 - () http://secunia.com/advisories/55568 -
References () http://support.apple.com/kb/HT5934 - () http://support.apple.com/kb/HT5934 -
References () http://support.apple.com/kb/HT6001 - () http://support.apple.com/kb/HT6001 -
References () http://www.debian.org/security/2012/dsa-2580 - () http://www.debian.org/security/2012/dsa-2580 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:056 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:056 -
References () http://www.securityfocus.com/bid/56684 - () http://www.securityfocus.com/bid/56684 -
References () http://www.securitytracker.com/id?1027815 - () http://www.securitytracker.com/id?1027815 -
References () http://www.ubuntu.com/usn/USN-1656-1 - () http://www.ubuntu.com/usn/USN-1656-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=880466 - () https://bugzilla.redhat.com/show_bug.cgi?id=880466 -
References () https://code.google.com/p/chromium/issues/detail?id=158249 - () https://code.google.com/p/chromium/issues/detail?id=158249 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80294 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80294 -

07 Nov 2023, 02:12

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html -
References (DEBIAN) http://www.debian.org/security/2012/dsa-2580 - () http://www.debian.org/security/2012/dsa-2580 -
References (APPLE) http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html - () http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html -
References (BID) http://www.securityfocus.com/bid/56684 - () http://www.securityfocus.com/bid/56684 -
References (SECTRACK) http://www.securitytracker.com/id?1027815 - () http://www.securitytracker.com/id?1027815 -
References (CONFIRM) http://support.apple.com/kb/HT6001 - () http://support.apple.com/kb/HT6001 -
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:056 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:056 -
References (CONFIRM) http://support.apple.com/kb/HT5934 - () http://support.apple.com/kb/HT5934 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1512.html - () http://rhn.redhat.com/errata/RHSA-2012-1512.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html - () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html -
References (CONFIRM) http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html - Vendor Advisory () http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html -
References (UBUNTU) http://www.ubuntu.com/usn/USN-1656-1 - () http://www.ubuntu.com/usn/USN-1656-1 -
References (CONFIRM) http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d - Patch () http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d -
References (SECUNIA) http://secunia.com/advisories/55568 - () http://secunia.com/advisories/55568 -
References (SECUNIA) http://secunia.com/advisories/51448 - () http://secunia.com/advisories/51448 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html -
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=880466 - () https://bugzilla.redhat.com/show_bug.cgi?id=880466 -
References (CONFIRM) https://code.google.com/p/chromium/issues/detail?id=158249 - () https://code.google.com/p/chromium/issues/detail?id=158249 -
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/80294 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80294 -
References (SECUNIA) http://secunia.com/advisories/54886 - Vendor Advisory () http://secunia.com/advisories/54886 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-0217.html - () http://rhn.redhat.com/errata/RHSA-2013-0217.html -
References (APPLE) http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html - () http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html -

Information

Published : 2012-11-28 01:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5134

Mitre link : CVE-2012-5134

CVE.ORG link : CVE-2012-5134


JSON object : View

Products Affected

xmlsoft

  • libxml2

apple

  • iphone_os

google

  • chrome
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer