First published: Fri Nov 13 2015(Updated: )
Heap-based buffer overflow was found in xmlParseXmlDecl. When conversion failure happens, parser continues to extract more errors which may lead to unexpected behaviour. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=756527">https://bugzilla.gnome.org/show_bug.cgi?id=756527</a> Upstream patch: <a href="https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43">https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1281879 is high due to the potential for a heap-based buffer overflow.
The affected software for REDHAT-BUG-1281879 includes GNOME's libxml2 library.
To fix REDHAT-BUG-1281879, update your libxml2 to the latest version that contains the security patch.
The vulnerability in REDHAT-BUG-1281879 is caused by a heap-based buffer overflow during XML parsing under certain error conditions.
Yes, REDHAT-BUG-1281879 can potentially lead to system compromise due to unexpected behavior caused by the buffer overflow.