Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64625
Category:Fedora Local Security Checks
Title:Fedora Core 10 FEDORA-2009-8491 (libxml2)
Summary:The remote host is missing an update to libxml2;announced via advisory FEDORA-2009-8491.;Note: This VT has been deprecated and is therefore no longer functional.
Description:Summary:
The remote host is missing an update to libxml2
announced via advisory FEDORA-2009-8491.
Note: This VT has been deprecated and is therefore no longer functional.

Vulnerability Insight:
Update Information:

Two patches for parsing problems raised by ficora

ChangeLog:

* Mon Aug 10 2009 Daniel Veillard - 2.7.3-2

- two patches for parsing problems CVE-2009-2414 and CVE-2009-2416

* Mon Jan 19 2009 Daniel Veillard - 2.7.3-1.fc10

- new release 2.7.3

- limit default max size of text nodes

- special parser mode for PHP

- bug fixes and more compiler checks

Solution:
Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update libxml2' at the command line.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-2414
20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
http://www.securityfocus.com/archive/1/507985/100/0/threaded
35036
http://secunia.com/advisories/35036
36010
http://www.securityfocus.com/bid/36010
36207
http://secunia.com/advisories/36207
36338
http://secunia.com/advisories/36338
36417
http://secunia.com/advisories/36417
36631
http://secunia.com/advisories/36631
37346
http://secunia.com/advisories/37346
37471
http://secunia.com/advisories/37471
ADV-2009-2420
http://www.vupen.com/english/advisories/2009/2420
ADV-2009-3184
http://www.vupen.com/english/advisories/2009/3184
ADV-2009-3217
http://www.vupen.com/english/advisories/2009/3217
ADV-2009-3316
http://www.vupen.com/english/advisories/2009/3316
APPLE-SA-2009-11-09-1
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
APPLE-SA-2009-11-11-1
http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html
APPLE-SA-2010-06-21-1
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
DSA-1859
http://www.debian.org/security/2009/dsa-1859
FEDORA-2009-8491
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html
FEDORA-2009-8498
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html
FEDORA-2009-8580
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html
SUSE-SR:2009:015
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
USN-815-1
http://www.ubuntu.com/usn/USN-815-1
[debian-bugs-dist] 20090810 Bug#540865: libxml2: CVE-2009-2414, CVE-2009-2416 pointer-user-after-free and stack overflow because of function recursion
http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html
http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html
http://support.apple.com/kb/HT3937
http://support.apple.com/kb/HT3949
http://support.apple.com/kb/HT4225
http://www.cert.fi/en/reports/2009/vulnerability2009085.html
http://www.codenomicon.com/labs/xml/
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
https://bugzilla.redhat.com/show_bug.cgi?id=515195
https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59
oval:org.mitre.oval:def:10129
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10129
oval:org.mitre.oval:def:8639
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8639
Common Vulnerability Exposure (CVE) ID: CVE-2009-2416
https://bugzilla.redhat.com/show_bug.cgi?id=515205
oval:org.mitre.oval:def:7783
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7783
oval:org.mitre.oval:def:9262
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262
Common Vulnerability Exposure (CVE) ID: CVE-2008-4225
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
BugTraq ID: 32331
http://www.securityfocus.com/bid/32331
Debian Security Information: DSA-1666 (Google Search)
http://www.debian.org/security/2008/dsa-1666
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
http://security.gentoo.org/glsa/glsa-200812-06.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
http://www.osvdb.org/49992
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10025
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6234
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6415
http://www.redhat.com/support/errata/RHSA-2008-0988.html
http://securitytracker.com/id?1021239
http://secunia.com/advisories/32762
http://secunia.com/advisories/32764
http://secunia.com/advisories/32766
http://secunia.com/advisories/32773
http://secunia.com/advisories/32802
http://secunia.com/advisories/32807
http://secunia.com/advisories/32811
http://secunia.com/advisories/32974
http://secunia.com/advisories/33417
http://secunia.com/advisories/33746
http://secunia.com/advisories/33792
http://secunia.com/advisories/34247
http://secunia.com/advisories/35379
http://secunia.com/advisories/36173
http://secunia.com/advisories/36235
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
http://www.ubuntu.com/usn/usn-673-1
http://www.vupen.com/english/advisories/2008/3176
http://www.vupen.com/english/advisories/2009/0034
http://www.vupen.com/english/advisories/2009/0301
http://www.vupen.com/english/advisories/2009/0323
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
Common Vulnerability Exposure (CVE) ID: CVE-2008-4226
BugTraq ID: 32326
http://www.securityfocus.com/bid/32326
HPdes Security Advisory: HPSBMA02492
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
HPdes Security Advisory: SSRT100079
http://www.osvdb.org/49993
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6219
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6360
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9888
http://securitytracker.com/id?1021238
http://secunia.com/advisories/32872
SuSE Security Announcement: SUSE-SR:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.