English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75803 CVE descriptions
and 40037 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51061
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2004:650
Summary:Redhat Security Advisory RHSA-2004:650
Description:
The remote host is missing updates announced in
advisory RHSA-2004:650.

The libxml package contains a library for manipulating XML files.

Multiple buffer overflow bugs have been found in libxml versions prior to
2.6.14. If an attacker can trick a user into passing a specially crafted
FTP URL or FTP proxy URL to an application that uses the vulnerable
functions of libxml, it could be possible to execute arbitrary code.
Additionally, if an attacker can return a specially crafted DNS request to
libxml, it could be possible to execute arbitrary code. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-0989 to this issue.

Yuuichi Teranishi discovered a flaw in libxml versions prior to 2.6.6.
When fetching a remote resource via FTP or HTTP, libxml uses special
parsing routines. These routines can overflow a buffer if passed a very
long URL. If an attacker is able to find an application using libxml that
parses remote resources and allows them to influence the URL, then this
flaw could be used to execute arbitrary code. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0110
to this issue.

All users are advised to upgrade to this updated package, which contains
backported patches and is not vulnerable to these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2004-650.html

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0110
Debian Security Information: DSA-455 (Google Search)
http://www.debian.org/security/2004/dsa-455
http://security.gentoo.org/glsa/glsa-200403-01.xml
RedHat Security Advisories: RHSA-2004:090
http://rhn.redhat.com/errata/RHSA-2004-090.html
http://www.redhat.com/support/errata/RHSA-2004-091.html
Bugtraq: 20040305 [OpenPKG-SA-2004.003] OpenPKG Security Advisory (libxml) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=107851606605420&w=2
Bugtraq: 20040306 TSLSA-2004-0010 - libxml2 (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=107860178228804&w=2
http://www.redhat.com/support/errata/RHSA-2004-650.html
SuSE Security Announcement: SUSE-SR:2005:001 (Google Search)
http://www.novell.com/linux/security/advisories/2005_01_sr.html
CERT/CC vulnerability note: VU#493966
http://www.kb.cert.org/vuls/id/493966
Computer Incident Advisory Center Bulletin: O-086
http://www.ciac.org/ciac/bulletins/o-086.shtml
BugTraq ID: 9718
http://www.securityfocus.com/bid/9718
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11626
http://secunia.com/advisories/10958/
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:833
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:875
XForce ISS Database: libxml2-nanohttp-bo(15301)
http://xforce.iss.net/xforce/xfdb/15301
XForce ISS Database: libxml2-nanoftp-bo(15302)
http://xforce.iss.net/xforce/xfdb/15302
Common Vulnerability Exposure (CVE) ID: CVE-2004-0989
Bugtraq: 20041026 libxml2 remote buffer overflows (not in xml parsing code though) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=109880813013482&w=2
http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html
Conectiva Linux advisory: CLA-2004:890
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890
Debian Security Information: DSA-582 (Google Search)
http://www.debian.org/security/2004/dsa-582
http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml
http://www.redhat.com/support/errata/RHSA-2004-615.html
http://marc.theaimsgroup.com/?l=bugtraq&m=110972110516151&w=2
Computer Incident Advisory Center Bulletin: P-029
http://www.ciac.org/ciac/bulletins/p-029.shtml
BugTraq ID: 11526
http://www.securityfocus.com/bid/11526
http://www.osvdb.org/11179
http://www.osvdb.org/11180
http://www.osvdb.org/11324
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1173
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10505
http://securitytracker.com/id?1011941
http://secunia.com/advisories/13000
XForce ISS Database: libxml2-xmlnanoftpscanurl-bo(17870)
http://xforce.iss.net/xforce/xfdb/17870
XForce ISS Database: libxml2-xmlnanoftpscanproxy-bo(17875)
http://xforce.iss.net/xforce/xfdb/17875
XForce ISS Database: libxml2-nanoftp-file-bo(17872)
http://xforce.iss.net/xforce/xfdb/17872
XForce ISS Database: libxml2-nanohttp-file-bo(17876)
http://xforce.iss.net/xforce/xfdb/17876
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.