Gentoo Archives: gentoo-announce

From: Tim Yamin <plasmaroo@g.o>
To: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××.com, security-alerts@×××××××××××××.com, gentoo-core@l.g.o, gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 200403-01 ] Libxml2 URI Parsing Buffer Overflow Vulnerabilities
Date: Sat, 06 Mar 2004 23:29:22
Message-Id: 404A5E06.1080204@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200403-01
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 ~ http://security.gentoo.org
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 ~ Severity: Normal
11 ~ Title: Libxml2 URI Parsing Buffer Overflow Vulnerabilities
12 ~ Date: March 06, 2004
13 ~ Bugs: #42735
14 ~ ID: 200403-01
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 A buffer overflow has been discovered in libxml2 versions prior to
22 2.6.6 which may be exploited by an attacker allowing the execution of
23 arbitrary code.
24
25 Description
26 ===========
27
28 Yuuichi Teranishi discovered a flaw in libxml2 versions prior to 2.6.6.
29 When the libxml2 library fetches a remote resource via FTP or HTTP,
30 libxml2 uses parsing routines that can overflow a buffer caused by
31 improper bounds checking if they are passed a URL longer than 4096
32 bytes.
33
34 Impact
35 ======
36
37 If an attacker is able to exploit an application using libxml2 that
38 parses remote resources, then this flaw could be used to execute
39 arbitrary code.
40
41 Workaround
42 ==========
43
44 No workaround is available; users are urged to upgrade libxml2 to
45 2.6.6.
46
47 Resolution
48 ==========
49
50 All users are recommended to upgrade their libxml2 installation:
51
52 ~ # emerge sync
53 ~ # emerge -pv ">=dev-libs/libxml2-2.6.6"
54 ~ # emerge ">=dev-libs/libxml2-2.6.6"
55
56 References
57 ==========
58
59 ~ [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0110
60
61 Concerns?
62 =========
63
64 Security is a primary focus of Gentoo Linux and ensuring the
65 confidentiality and security of our users machines is of utmost
66 importance to us. Any security concerns should be addressed to
67 security@g.o or alternatively, you may file a bug at
68 http://bugs.gentoo.org.
69
70 -----BEGIN PGP SIGNATURE-----
71 Version: GnuPG v1.2.4 (GNU/Linux)
72 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
73
74 iD8DBQFASl4EMMXbAy2b2EIRAv+yAJ9NbGSqlVb4KzZ2IC4c2DBt3aaV1ACgxlhB
75 1c1NaJh9ByyfACBlmAU0Yz4=
76 =scAU
77 -----END PGP SIGNATURE-----