Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11068

Опубликовано: 10 апр. 2019
Источник: redhat
CVSS3: 6.3

Описание

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

Отчет

Red Hat OpenStack will consume fixes from the base Red Hat Enterprise Linux Operating System. Therefore the package provided by Red Hat OpenStack has been marked as will not fix.

Меры по смягчению последствий

This flaw only applies to applications compiled against libxml2 which use xsltCheckRead and xsltCheckWrite functions and/or allow users to load arbitrary URLs to be parsed via libxml2. In all other cases, applications are not vulnerable.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5libxsltWill not fix
Red Hat Enterprise Linux 6libxsltWill not fix
Red Hat OpenStack Platform 10 (Newton)libxsltWill not fix
Red Hat OpenStack Platform 13 (Queens)libxsltWill not fix
Red Hat OpenStack Platform 14 (Rocky)libxsltWill not fix
Red Hat OpenStack Platform 9 (Mitaka)libxsltWill not fix
Red Hat Storage 3libxsltAffected
Red Hat Enterprise Linux 7libxsltFixedRHSA-2020:400529.09.2020
Red Hat Enterprise Linux 8libxsltFixedRHSA-2020:446404.11.2020
Red Hat Enterprise Linux 8libxsltFixedRHSA-2020:446404.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1709697libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

CVSS3: 9.8
nvd
больше 6 лет назад

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

CVSS3: 9.8
debian
больше 6 лет назад

libxslt through 1.1.33 allows bypass of a protection mechanism because ...

suse-cvrf
около 6 лет назад

Security update for libxslt

suse-cvrf
около 6 лет назад

Security update for libxslt

6.3 Medium

CVSS3