![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.123814 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2012-1288) |
Summary: | The remote host is missing an update for the 'libxml2' package(s) announced via the ELSA-2012-1288 advisory. |
Description: | Summary: The remote host is missing an update for the 'libxml2' package(s) announced via the ELSA-2012-1288 advisory. Vulnerability Insight: [2.7.6-8.0.1.el6_3.3 ] - Update doc/redhat.gif in tarball - Add libxml2-oracle-enterprise.patch and update logos in tarball [2.7.6-8.el6_3.3] - Change the XPath code to percolate allocation error (CVE-2011-1944) [2.7.6-8.el6_3.2] - Fix an off by one pointer access (CVE-2011-3102) [2.7.6-8.el6_3.1] - Fix a failure to report xmlreader parsing failures - Fix parser local buffers size problems (rhbz#843741) - Fix entities local buffers size problems (rhbz#843741) - Fix an error in previous commit (rhbz#843741) - Do not fetch external parsed entities - Impose a reasonable limit on attribute size (rhbz#843741) - Impose a reasonable limit on comment size (rhbz#843741) - Impose a reasonable limit on PI size (rhbz#843741) - Cleanups and new limit APIs for dictionaries (rhbz#843741) - Introduce some default parser limits (rhbz#843741) - Implement some default limits in the XPath module - Fixup limits parser (rhbz#843741) - Enforce XML_PARSER_EOF state handling through the parser - Avoid quadratic behaviour in some push parsing cases (rhbz#843741) - More avoid quadratic behaviour (rhbz#843741) - Strengthen behaviour of the push parser in problematic situations (rhbz#843741) - More fixups on the push parser behaviour (rhbz#843741) - Fix a segfault on XSD validation on pattern error - Fix an unimplemented part in RNG value validation [2.7.6-8.el6] - remove chunk in patch related to configure.in as it breaks rebuild - Resolves: rhbz#788846 [2.7.6-7.el6] - fix previous build to force compilation of randomization code - Resolves: rhbz#788846 [2.7.6-6.el6] - adds randomization to hash and dict structures CVE-2012-0841 - Resolves: rhbz#788846 [2.7.6-5.el6] - Make sure the parser returns when getting a Stop order CVE-2011-3905 - Fix an allocation error when copying entities CVE-2011-3919 - Resolves: rhbz#771910 Affected Software/OS: 'libxml2' package(s) on Oracle Linux 5, Oracle Linux 6. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-3102 http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html BugTraq ID: 53540 http://www.securityfocus.com/bid/53540 Debian Security Information: DSA-2479 (Google Search) http://www.debian.org/security/2012/dsa-2479 http://www.mandriva.com/security/advisories?name=MDVSA-2012:098 http://www.mandriva.com/security/advisories?name=MDVSA-2013:056 RedHat Security Advisories: RHSA-2013:0217 http://rhn.redhat.com/errata/RHSA-2013-0217.html http://www.securitytracker.com/id?1027067 http://secunia.com/advisories/49243 http://secunia.com/advisories/50658 http://secunia.com/advisories/54886 http://secunia.com/advisories/55568 SuSE Security Announcement: SUSE-SU-2013:1627 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html SuSE Security Announcement: openSUSE-SU-2012:0656 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html SuSE Security Announcement: openSUSE-SU-2012:0731 (Google Search) https://lists.opensuse.org/opensuse-updates/2012-06/msg00011.html XForce ISS Database: google-chrome-libxml-code-exec(75607) https://exchange.xforce.ibmcloud.com/vulnerabilities/75607 Common Vulnerability Exposure (CVE) ID: CVE-2012-2807 BugTraq ID: 54718 http://www.securityfocus.com/bid/54718 Debian Security Information: DSA-2521 (Google Search) http://www.debian.org/security/2012/dsa-2521 http://www.mandriva.com/security/advisories?name=MDVSA-2012:126 http://secunia.com/advisories/50800 SuSE Security Announcement: openSUSE-SU-2012:0813 (Google Search) https://hermes.opensuse.org/messages/15075728 SuSE Security Announcement: openSUSE-SU-2012:0975 (Google Search) https://hermes.opensuse.org/messages/15375990 http://www.ubuntu.com/usn/USN-1587-1 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |