First published: Fri Nov 13 2015(Updated: )
An out-of-bounds heap read in xmlParseXMLDecl happens when a file containing unfinished xml declaration, e.g. <?xml versionencoding="ISO88598", is followed by 0xff byte. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=751631">https://bugzilla.gnome.org/show_bug.cgi?id=751631</a> Upstream patch: <a href="https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e">https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e</a> Out-of-bounds heap read also occurs in xmlParseXMLDecl when file contains unterminated encoding value. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=751603">https://bugzilla.gnome.org/show_bug.cgi?id=751603</a> Upstream patch: <a href="https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c">https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1281930 is classified as a high-risk vulnerability due to the potential for exploitation.
To fix REDHAT-BUG-1281930, update to the latest version of libxml2 that addresses this out-of-bounds heap read issue.
The affected software for REDHAT-BUG-1281930 is GNOME's libxml2.
The vulnerability REDHAT-BUG-1281930 is caused by an out-of-bounds heap read during XML parsing when encountering an unfinished XML declaration.
As of now, there are no public exploits known for REDHAT-BUG-1281930, but the potential for exploitation exists.