First published: Fri Nov 07 2008(Updated: )
Created <span class=""><a href="attachment.cgi?id=322841&action=diff" name="attach_322841" title="Proposed patch from Drew Yao">attachment 322841</a> <a href="attachment.cgi?id=322841&action=edit" title="Proposed patch from Drew Yao">[details]</a></span> Proposed patch from Drew Yao Description of problem: Drew Yao from Apple Product Security has reported integer overflow leading to memory corruption present in the xmlSAX2Characters() function in the libxml2 library. User could trigger this flaw by providing very large XML file for parsing to the XML parsing library, which would corrupt the memory and might potentially allow arbitrary code execution. Proposed patch: See attachment. Acknowledgements: Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libxml2 | =2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4226 has a severity rating of moderate, reflecting potential risks in the affected software.
To fix CVE-2008-4226, upgrade the affected software, specifically libxml version 2.7.2 or later.
CVE-2008-4226 primarily affects libxml version 2.7.2.
CVE-2008-4226 is categorized as a security vulnerability affecting XML parsing.
There are no widely reported exploits for CVE-2008-4226, but it is advisable to apply the patch as a precaution.