RHEL 2.1 / 3 : libxml2 (RHSA-2004:615)

critical Nessus Plugin ID 15702

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An updated libxml2 package that fixes multiple buffer overflows is now available.

libxml2 is a library for manipulating XML files.

Multiple buffer overflow bugs have been found in libxml2 versions prior to 2.6.14. If an attacker can trick a user into passing a specially crafted FTP URL or FTP proxy URL to an application that uses the vulnerable functions of libxml2, it could be possible to execute arbitrary code. Additionally, if an attacker can return a specially crafted DNS request to libxml2, it could be possible to execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0989 to this issue.

All users are advised to upgrade to this updated package, which contains backported patches and is not vulnerable to these issues.

Solution

Update the affected libxml2, libxml2-devel and / or libxml2-python packages.

See Also

https://access.redhat.com/security/cve/cve-2004-0989

https://www.securityfocus.com/archive/1/379383/2004-10-24/2004-10-30/0

https://access.redhat.com/errata/RHSA-2004:615

Plugin Details

Severity: Critical

ID: 15702

File Name: redhat-RHSA-2004-615.nasl

Version: 1.26

Type: local

Agent: unix

Published: 11/13/2004

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:libxml2-devel, cpe:/o:redhat:enterprise_linux:3, p-cpe:/a:redhat:enterprise_linux:libxml2, p-cpe:/a:redhat:enterprise_linux:libxml2-python, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 11/12/2004

Vulnerability Publication Date: 3/1/2005

Reference Information

CVE: CVE-2004-0989

RHSA: 2004:615