First published: Mon Feb 18 2013(Updated: )
A denial of service flaw was found in the way libxml2, a library providing support to read, modify and write XML and HTML files, performed string substitutions when entity values for entity references replacement (--noent option) was requested / enabled during the XML file parsing. A remote attacker could provide a specially-crafted XML file that, when processed would lead to excessive CPU consumption (denial of service).
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-912400 is classified as a high impact vulnerability that can lead to denial of service.
To fix REDHAT-BUG-912400, you should update libxml2 to the latest patched version provided by your vendor.
REDHAT-BUG-912400 affects systems using the libxml2 library for XML and HTML file processing.
REDHAT-BUG-912400 allows remote attackers to exploit a denial of service condition through malformed XML files.
REDHAT-BUG-912400 was reported in relation to a vulnerability affecting libxml2.