First published: Fri Nov 07 2008(Updated: )
Created <span class=""><a href="attachment.cgi?id=322846&action=diff" name="attach_322846" title="Proposed patch from Drew Yao">attachment 322846</a> <a href="attachment.cgi?id=322846&action=edit" title="Proposed patch from Drew Yao">[details]</a></span> Proposed patch from Drew Yao Description of problem: Drew Yao of Apple Product Security has reported an integer overflow present in xmlBufferResize function in the libxml2 library potentially leading to an infinite loop. User could provide a very large XML file for parsing to the XML parsing library, which could allow him to cause a denial of service. Proposed patch: See attachment. Acknowledgements: Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libxml2 | =2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4225 has been classified as a medium severity vulnerability.
To fix CVE-2008-4225, upgrade Libxml2 to version 2.7.3 or higher.
CVE-2008-4225 affects Libxml2 version 2.7.2.
Yes, CVE-2008-4225 can be exploited remotely under certain conditions.
CVE-2008-4225 is a vulnerability related to improper processing of XML data.