First published: Tue Feb 22 2011(Updated: )
The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xmlsoft Libxslt | <=1.1.26 | |
Google Chrome | <10.0.648.127 | |
redhat/firefox | <0:3.6.17-2.el4 | 0:3.6.17-2.el4 |
redhat/firefox | <0:3.6.17-1.el5_6 | 0:3.6.17-1.el5_6 |
redhat/xulrunner | <0:1.9.2.17-3.el5_6 | 0:1.9.2.17-3.el5_6 |
redhat/libxslt | <0:1.1.17-4.el5_8.3 | 0:1.1.17-4.el5_8.3 |
redhat/firefox | <0:3.6.17-1.el6_0 | 0:3.6.17-1.el6_0 |
redhat/xulrunner | <0:1.9.2.17-4.el6_0 | 0:1.9.2.17-4.el6_0 |
redhat/libxslt | <0:1.1.26-2.el6_3.1 | 0:1.1.26-2.el6_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.