English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 72151 CVE descriptions
and 38907 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.52312
Category:FreeBSD Local Security Checks
Title:FreeBSD Ports: libxml
Summary:FreeBSD Ports: libxml
Description:The remote host is missing an update to the system
as announced in the referenced advisory.

The following packages are affected:
libxml
libxml2

CVE-2004-0989
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and
possibly other versions, may allow remote attackers to execute
arbitrary code via (1) a long FTP URL that is not properly handled by
the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP
data that is not properly handled by the xmlNanoFTPScanProxy function,
and other overflows related to manipulation of DNS length values,
including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5)
xmlNanoHTTPConnectHost.

Solution:
Update your system with the appropriate patches or
software upgrades.

http://www.debian.org/security/2004/dsa-582
http://marc.theaimsgroup.com/?l=bugtraq&m=109880813013482
http://www.vuxml.org/freebsd/9ff4c91e-328c-11d9-a9e7-0001020eed82.html
Cross-Ref: BugTraq ID: 11526
Common Vulnerability Exposure (CVE) ID: CVE-2004-0989
Bugtraq: 20041026 libxml2 remote buffer overflows (not in xml parsing code though) (Google Search)
http://marc.theaimsgroup.com/?l=bugtraq&m=109880813013482&w=2
http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html
Conectiva Linux advisory: CLA-2004:890
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890
Debian Security Information: DSA-582 (Google Search)
http://www.debian.org/security/2004/dsa-582
http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml
http://www.redhat.com/support/errata/RHSA-2004-615.html
http://www.redhat.com/support/errata/RHSA-2004-650.html
SuSE Security Announcement: SUSE-SR:2005:001 (Google Search)
http://www.novell.com/linux/security/advisories/2005_01_sr.html
http://marc.theaimsgroup.com/?l=bugtraq&m=110972110516151&w=2
Computer Incident Advisory Center Bulletin: P-029
http://www.ciac.org/ciac/bulletins/p-029.shtml
http://www.securityfocus.com/bid/11526
http://www.osvdb.org/11179
http://www.osvdb.org/11180
http://www.osvdb.org/11324
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1173
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10505
http://securitytracker.com/id?1011941
http://secunia.com/advisories/13000
XForce ISS Database: libxml2-xmlnanoftpscanurl-bo(17870)
http://xforce.iss.net/xforce/xfdb/17870
XForce ISS Database: libxml2-xmlnanoftpscanproxy-bo(17875)
http://xforce.iss.net/xforce/xfdb/17875
XForce ISS Database: libxml2-nanoftp-file-bo(17872)
http://xforce.iss.net/xforce/xfdb/17872
XForce ISS Database: libxml2-nanohttp-file-bo(17876)
http://xforce.iss.net/xforce/xfdb/17876
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 38907 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.