First published: Sat Mar 12 2011(Updated: )
Chris Evans discovered a heap address leak in XSLT The bug is in the generate-id() XPath function, and is sometimes used in XSL transforms. This is a low severity information leak, that does not corrupt anything, However it can be paired with other bugs and can be perhaps used as an exploit aid against ASLR. References: <a href="http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html">http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html</a> <a href="http://git.gnome.org/browse/libxslt/commit/?id=ecb6bcb8d1b7e44842edde3929f412d46b40c89f">http://git.gnome.org/browse/libxslt/commit/?id=ecb6bcb8d1b7e44842edde3929f412d46b40c89f</a> This has been assigned <a href="https://access.redhat.com/security/cve/CVE-2011-1202">CVE-2011-1202</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
libxslt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-684386 is low, involving an information leak without corruption.
REDHAT-BUG-684386 may be used in conjunction with other vulnerabilities to aid exploit attempts.
The affected software for REDHAT-BUG-684386 includes GNOME libxslt.
Yes, users should update their GNOME libxslt to the latest version to mitigate the issue.
The function involved in REDHAT-BUG-684386 is the generate-id() XPath function used in XSL transforms.