First published: Thu Oct 28 2004(Updated: )
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xmlsoft Libxml2 | =2.6.11 | |
Xmlsoft Libxml2 | =2.6.13 | |
Xmlsoft Libxml2 | =2.6.7 | |
Xmlsoft Libxml2 | =2.6.14 | |
XMLStarlet Command Line XML Toolkit | =0.9.1 | |
Xmlsoft Libxml2 | =2.6.8 | |
Xmlsoft Libxml2 | =2.5.11 | |
XMLSoft Libxml | =1.8.17 | |
Xmlsoft Libxml2 | =2.6.12 | |
Xmlsoft Libxml2 | =2.6.9 | |
Xmlsoft Libxml2 | =2.6.6 | |
Redhat Fedora Core | =core_2.0 | |
Trustix Secure Linux | =2.0 | |
Ubuntu Ubuntu Linux | =4.1 | |
Trustix Secure Linux | =2.1 | |
Ubuntu Ubuntu Linux | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.