First published: Tue Feb 22 2011(Updated: )
The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <0:3.6.17-2.el4 | 0:3.6.17-2.el4 |
redhat/firefox | <0:3.6.17-1.el5_6 | 0:3.6.17-1.el5_6 |
redhat/xulrunner | <0:1.9.2.17-3.el5_6 | 0:1.9.2.17-3.el5_6 |
redhat/libxslt | <0:1.1.17-4.el5_8.3 | 0:1.1.17-4.el5_8.3 |
redhat/firefox | <0:3.6.17-1.el6_0 | 0:3.6.17-1.el6_0 |
redhat/xulrunner | <0:1.9.2.17-4.el6_0 | 0:1.9.2.17-4.el6_0 |
redhat/libxslt | <0:1.1.26-2.el6_3.1 | 0:1.1.26-2.el6_3.1 |
libxslt | <=1.1.26 | |
Google Chrome (Trace Event) | <10.0.648.127 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1202 is classified as a high severity vulnerability that allows remote attackers to access sensitive heap memory information.
To fix CVE-2011-1202, you should update to the latest versions of affected packages such as libxslt, Firefox, or Google Chrome.
CVE-2011-1202 affects libxslt versions up to 1.1.26, Google Chrome versions before 10.0.648.127, and certain versions of Firefox.
Yes, CVE-2011-1202 can be exploited remotely via specially crafted XML documents.
CVE-2011-1202 can leak potentially sensitive information about heap memory addresses.