The expat XML parser code, as used in the open source Jabber (jabberd) 1.4.3 and earlier, jadc2s 0.9.0 and earlier, and possibly other packages, allows remote attackers to cause a denial of service (application crash) via a malformed packet to a socket that accepts XML connections.
Link | Tags |
---|---|
http://securitytracker.com/id?1011384 | vdb entry |
http://www.osvdb.org/10257 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17466 | vdb entry |
http://www.securityfocus.com/bid/11231 | vdb entry patch |
http://www.vuxml.org/freebsd/2e25d38b-54d1-11d9-b612-000c6e8f12ef.html | |
http://www.gentoo.org/security/en/glsa/glsa-200409-31.xml | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17467 | vdb entry |
http://securitytracker.com/id?1011383 | vdb entry |
http://devel.amessage.info/jabberd14/ | patch |
http://mail.jabber.org/pipermail/jabberd/2004-September/002004.html | mailing list |
http://marc.info/?l=bugtraq&m=109583829122679&w=2 | mailing list |
http://secunia.com/advisories/12636 | third party advisory |