First published: Thu Oct 28 2004(Updated: )
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 | =1.8.17 | |
Gnome Libxml2 | =2.5.11 | |
Gnome Libxml2 | =2.6.6 | |
Gnome Libxml2 | =2.6.7 | |
Gnome Libxml2 | =2.6.8 | |
Gnome Libxml2 | =2.6.9 | |
Gnome Libxml2 | =2.6.11 | |
Gnome Libxml2 | =2.6.12 | |
Gnome Libxml2 | =2.6.13 | |
Gnome Libxml2 | =2.6.14 | |
XMLStarlet Command Line XML Toolkit | =0.9.1 | |
Red Hat Fedora Core | =core_2.0 | |
Trustix Secure Linux | =2.0 | |
Trustix Secure Linux | =2.1 | |
Ubuntu Linux | =4.1 | |
Ubuntu Linux | =4.1 | |
libxml2 | =2.6.11 | |
libxml2 | =2.6.13 | |
libxml2 | =2.6.7 | |
libxml2 | =2.6.14 | |
libxml2 | =2.6.8 | |
libxml2 | =2.5.11 | |
Libxml2 | =1.8.17 | |
libxml2 | =2.6.12 | |
libxml2 | =2.6.9 | |
libxml2 | =2.6.6 | |
Ubuntu | =4.1 | |
Ubuntu | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0989 is classified as a high severity vulnerability due to the potential for remote code execution.
To remediate CVE-2004-0989, upgrade libXML to version 2.6.14 or later, where this vulnerability is patched.
Affected versions include libXML 2.6.12, 2.6.13, and earlier versions up to 2.6.11.
CVE-2004-0989 is identified as a buffer overflow vulnerability.
Yes, CVE-2004-0989 can be exploited by remote attackers to execute arbitrary code on the vulnerable system.