1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
5 |
Gentoo Linux Security Advisory GLSA 200403-01 |
6 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
7 |
~ http://security.gentoo.org |
8 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
9 |
|
10 |
~ Severity: Normal |
11 |
~ Title: Libxml2 URI Parsing Buffer Overflow Vulnerabilities |
12 |
~ Date: March 06, 2004 |
13 |
~ Bugs: #42735 |
14 |
~ ID: 200403-01 |
15 |
|
16 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
17 |
|
18 |
Synopsis |
19 |
======== |
20 |
|
21 |
A buffer overflow has been discovered in libxml2 versions prior to |
22 |
2.6.6 which may be exploited by an attacker allowing the execution of |
23 |
arbitrary code. |
24 |
|
25 |
Description |
26 |
=========== |
27 |
|
28 |
Yuuichi Teranishi discovered a flaw in libxml2 versions prior to 2.6.6. |
29 |
When the libxml2 library fetches a remote resource via FTP or HTTP, |
30 |
libxml2 uses parsing routines that can overflow a buffer caused by |
31 |
improper bounds checking if they are passed a URL longer than 4096 |
32 |
bytes. |
33 |
|
34 |
Impact |
35 |
====== |
36 |
|
37 |
If an attacker is able to exploit an application using libxml2 that |
38 |
parses remote resources, then this flaw could be used to execute |
39 |
arbitrary code. |
40 |
|
41 |
Workaround |
42 |
========== |
43 |
|
44 |
No workaround is available; users are urged to upgrade libxml2 to |
45 |
2.6.6. |
46 |
|
47 |
Resolution |
48 |
========== |
49 |
|
50 |
All users are recommended to upgrade their libxml2 installation: |
51 |
|
52 |
~ # emerge sync |
53 |
~ # emerge -pv ">=dev-libs/libxml2-2.6.6" |
54 |
~ # emerge ">=dev-libs/libxml2-2.6.6" |
55 |
|
56 |
References |
57 |
========== |
58 |
|
59 |
~ [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110 |
60 |
|
61 |
Concerns? |
62 |
========= |
63 |
|
64 |
Security is a primary focus of Gentoo Linux and ensuring the |
65 |
confidentiality and security of our users machines is of utmost |
66 |
importance to us. Any security concerns should be addressed to |
67 |
security@g.o or alternatively, you may file a bug at |
68 |
http://bugs.gentoo.org. |
69 |
|
70 |
-----BEGIN PGP SIGNATURE----- |
71 |
Version: GnuPG v1.2.4 (GNU/Linux) |
72 |
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org |
73 |
|
74 |
iD8DBQFASl4EMMXbAy2b2EIRAv+yAJ9NbGSqlVb4KzZ2IC4c2DBt3aaV1ACgxlhB |
75 |
1c1NaJh9ByyfACBlmAU0Yz4= |
76 |
=scAU |
77 |
-----END PGP SIGNATURE----- |