Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2011-1944

Опубликовано: 02 сент. 2011
Источник: nvd
CVSS2: 9.3
EPSS Средний

Описание

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:xmlsoft:libxml:*:*:*:*:*:*:*:*
Версия до 1.8.16 (включая)
cpe:2.3:a:xmlsoft:libxml:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.11:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.12:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.13:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.14:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml:1.8.15:*:*:*:*:*:*:*

EPSS

Процентиль: 95%
0.16509
Средний

9.3 Critical

CVSS2

Дефекты

CWE-189

Связанные уязвимости

ubuntu
почти 14 лет назад

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.

redhat
около 14 лет назад

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.

debian
почти 14 лет назад

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x ...

github
около 3 лет назад

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.

fstec
почти 14 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 95%
0.16509
Средний

9.3 Critical

CVSS2

Дефекты

CWE-189