Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
References
Configurations
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html - | |
References | () http://secunia.com/advisories/53061 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2013/04/17/4 - | |
References | () http://www.openwall.com/lists/oss-security/2013/04/19/1 - | |
References | () http://www.ubuntu.com/usn/USN-1817-1 - | |
References | () https://bugzilla.gnome.org/show_bug.cgi?id=690202 - | |
References | () https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f - Exploit |
Information
Published : 2013-04-25 23:55
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1969
Mitre link : CVE-2013-1969
CVE.ORG link : CVE-2013-1969
JSON object : View
Products Affected
xmlsoft
- libxml2
CWE
CWE-399
Resource Management Errors