Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f | exploit |
http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html | vendor advisory |
https://bugzilla.gnome.org/show_bug.cgi?id=690202 | |
http://www.ubuntu.com/usn/USN-1817-1 | vendor advisory |
http://www.openwall.com/lists/oss-security/2013/04/17/4 | mailing list |
http://secunia.com/advisories/53061 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2013/04/19/1 | mailing list |