Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50448
Category:Ubuntu Local Security Checks
Title:Ubuntu 4.10 USN-10-1 (XML library)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to XML library
announced via advisory USN-10-1.

Several buffer overflows have been discovered in libxml2's FTP connection
and DNS resolution functions. Supplying very long FTP URLs or IP
addresses might result in execution of arbitrary code with the
privileges of the process using libxml2.

Since libxml2 is used in packages like php4-imagick, the vulnerability
also might lead to privilege escalation, like executing attacker
supplied code with a web server's privileges.

However, this does not affect the core XML parsing code, which is what
the majority of programs use this library for.

The following packages are affected: libxml2

Solution:
The problem can be corrected by upgrading the affected package to
version 2.6.11-3ubuntu1.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.

http://lists.ubuntu.com/archives/ubuntu-security-announce/2004-October/000014.html

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: BugTraq ID: 11548
Common Vulnerability Exposure (CVE) ID: CVE-2004-0981
http://www.securityfocus.org/bid/11548
http://security.gentoo.org/glsa/glsa-200411-11.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10472
http://secunia.com/advisories/12995/
https://www.ubuntu.com/usn/usn-7-1/
XForce ISS Database: imagemagick-exif-image-bo(17903)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17903
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.