First published: Mon Aug 29 2011(Updated: )
Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Chrome | <13.0.782.215 | |
Debian Linux | =5.0 | |
Debian Linux | =7.0 | |
Debian Linux | =6.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Server EUS | =6.3 | |
iPhone OS | <6.0 | |
Apple iOS and macOS | <10.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2821 is considered to have a high severity as it can lead to a denial of service and potential exploitation.
To fix CVE-2011-2821, update Google Chrome to version 13.0.782.215 or later.
CVE-2011-2821 affects Google Chrome versions before 13.0.782.215, various Debian versions, and Red Hat Enterprise Linux 6.0.
CVE-2011-2821 is classified as a double free vulnerability in the libxml2 library.
Yes, CVE-2011-2821 can be exploited remotely by attackers using a crafted XPath expression.