Joined: 25 Feb 2003
Location: Essen, Germany
|Posted: Tue Nov 02, 2004 6:38 pm Post subject: [ GLSA 200411-05 ] libxml2: Remotely exploitable buffer over
|Gentoo Linux Security Advisory
Title: libxml2: Remotely exploitable buffer overflow (GLSA 200411-05)
Date: November 02, 2004
libxml2 contains multiple buffer overflows which could lead to the
execution of arbitrary code.
libxml2 is an XML parsing library written in C.
Vulnerable: < 2.6.15
Unaffected: >= 2.6.15
Architectures: All supported architectures
Multiple buffer overflows have been detected in the nanoftp and nanohttp
modules. These modules are responsible for parsing URLs with ftp
information, and resolving names via DNS.
An attacker could exploit an application that uses libxml2 by forcing it to
parse a specially-crafted XML file, potentially causing remote execution of
There is no known workaround at this time.
All libxml2 users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.15"
Last edited by GLSA on Wed Jul 14, 2010 4:18 am; edited 3 times in total