ID CVE-2004-0989
Summary Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
References
Vulnerable Configurations
  • cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
    cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
    cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
    cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
  • cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
    cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
CVSS
Base: 10.0 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2013-04-29T04:06:14.394-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    description Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
    family unix
    id oval:org.mitre.oval:def:10505
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
    version 30
  • accepted 2005-08-18T07:37:00.000-04:00
    class vulnerability
    contributors
    name Jay Beale
    organization Bastille Linux
    description Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
    family unix
    id oval:org.mitre.oval:def:1173
    status accepted
    submitted 2005-06-27T12:00:00.000-04:00
    title Multiple Buffer Overflows in libXML2
    version 4
redhat via4
advisories
  • rhsa
    id RHSA-2004:615
  • rhsa
    id RHSA-2004:650
rpms
  • libxml2-0:2.5.10-7
  • libxml2-debuginfo-0:2.5.10-7
  • libxml2-devel-0:2.5.10-7
  • libxml2-python-0:2.5.10-7
  • libxml-1:1.8.17-9.2
  • libxml-debuginfo-1:1.8.17-9.2
  • libxml-devel-1:1.8.17-9.2
refmap via4
apple APPLE-SA-2005-01-25
bid 11526
bugtraq 20041026 libxml2 remote buffer overflows (not in xml parsing code though)
ciac P-029
conectiva CLA-2004:890
debian DSA-582
gentoo GLSA-200411-05
osvdb
  • 11179
  • 11180
  • 11324
sectrack 1011941
secunia 13000
suse SUSE-SR:2005:001
ubuntu USN-89-1
xf
  • libxml2-nanoftp-file-bo(17872)
  • libxml2-nanohttp-file-bo(17876)
  • libxml2-xmlnanoftpscanproxy-bo(17875)
  • libxml2-xmlnanoftpscanurl-bo(17870)
Last major update 11-10-2017 - 01:29
Published 01-03-2005 - 05:00
Last modified 11-10-2017 - 01:29
Back to Top