Page 15 of 89 results (0.009 seconds)

CVSS: 5.0EPSS: 1%CPEs: 116EXPL: 0

parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack. parser.c en libxml2 anterior a 2.9.2 no previene debidamente la expansión de entidades incluso cuando la substitución de entidades haya sido deshabilitada, lo que permite a atacantes dependientes de contexto causar una denegación de servicio (consumo de CPU) a través de un documento XML manipualdo que contiene un número grande de referencias de entidades anidadas, una variante del ataque del 'billón de risas'. A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html http://rhn.redhat.com/errata/RHSA-2014-1655.html http://rhn.redhat.com/errata/RHSA-2014-1885.html http://secunia.com/advisories/59903 http://s • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.0EPSS: 4%CPEs: 189EXPL: 0

parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state. parser.c en libxml2 anterior a 2.9.0 utilizada en Google Chrome anterior a 28.0.1500.71 y otros productos, permite a atacantes remotos provocar una denegación de servicio (lectura fuera de rango) a través de un documento que finaliza de golpe, relacionado con la falta de determinadas validaciones para el estado XML_PARSER_EOF. • ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1 http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html http://seclists.org/fulldisclosure/2014/Dec/23 http://secunia.c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function. Múltiples vulnerabilidades de uso después de liberación en libxml2 v2.9.0 y posiblemente otras versiones podrían permitir a atacantes dependientes de contexto provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de vectores relacionados con el (1) htmlParseChunk y (2) xmldecl_done funciones, como se demuestra por un desbordamiento de búfer en la función xmlBufGetInputBase. • http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html http://secunia.com/advisories/53061 http://www.openwall.com/lists/oss-security/2013/04/17/4 http://www.openwall.com/lists/oss-security/2013/04/19/1 http://www.ubuntu.com/usn/USN-1817-1 https://bugzilla.gnome.org/show_bug.cgi?id=690202 https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f • CWE-399: Resource Management Errors •

CVSS: 6.8EPSS: 1%CPEs: 135EXPL: 1

libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because libxml2 already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed and each affected application would need its own CVE. libxml2 hasta 2.9.1 no controla correctamente la expansión de entidades externas a menos que un desarrollador de aplicaciones utilice la función xmlSAX2ResolveEntity o xmlSetExternalEntityLoader, lo que permite a atacantes remotos provocar una denegación de servicio (consumo de recursos), enviar peticiones HTTP a los servidores de la intranet, o leer ficheros arbitrarios mediante un documento XML manipulada, también conocido una entidades externas XML (XXE) tema. NOTA: se podría argumentar que debido a que libxml2 ya ofrece la posibilidad de desactivar la expansión entidad externa, la responsabilidad de la solución de este problema se encuentra con los desarrolladores de aplicaciones, de acuerdo con este argumento, esta entrada debe ser rechazada y cada aplicación afectada tendría su propio CVE. • http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html http://openwall.com/lists/oss-security/2013/02/21/24 http://openwall.com/lists/oss-security/2013/02/22/3 http://seclists.org/oss-sec/2013/q4/182 http://seclists.org/oss-sec/2013/q4/184 http://seclists.org/oss-sec/2013/q4/188 http://secunia.com/advisories/52662 http://secunia.com/advisories/54172 http://secunia.com/advisories/55568 http://www.debian.org/security/2013/dsa-2652 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 1%CPEs: 134EXPL: 0

libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity. libxml2 v2.9.0 y anteriores permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de memoria y CPU) a través de un archivo XML que contiene una declaración de la entidad con el nuevo texto largo y muchas referencias a esta entidad, también conocido como "expansión entidad interna" con complejidad lineal. • http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html http://marc.info/?l=bugtraq&m=142798889927587&w=2 http://secunia.com/advisories/52662 http://secunia.com/advisories/55568 http://www.debian.org/security/2013/dsa-2652 http://www.mandriva.com/security/advisories?name=MDVSA-2013:056 http://www.oracle.com/technetwork/topics/security&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •