First published: Thu Apr 25 2013(Updated: )
Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2-devel | =2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1969 is considered a high severity vulnerability as it can lead to denial of service and potentially allow arbitrary code execution.
To fix CVE-2013-1969, update libxml2 to version 2.9.1 or later where the vulnerabilities have been addressed.
CVE-2013-1969 includes multiple use-after-free vulnerabilities in the htmlParseChunk and xmldecl_done functions.
Yes, context-dependent attackers may exploit CVE-2013-1969 remotely, potentially leading to a system crash or code execution.
Libxml2 version 2.9.0 is specifically affected by CVE-2013-1969, along with possibly other versions.