Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2013-0338

Published: 26 February 2013

libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.

Notes

AuthorNote
jdstrand
PoC in oss-sec

Priority

Medium

Status

Package Release Status
libxml2
Launchpad, Ubuntu, Debian
upstream
Released (2.8.0+dfsg1-7+nmu1)
hardy
Released (2.6.31.dfsg-2ubuntu1.12)
lucid
Released (2.7.6.dfsg-1ubuntu1.8)
oneiric
Released (2.7.8.dfsg-4ubuntu0.6)
precise
Released (2.7.8.dfsg-5.1ubuntu4.4)
quantal
Released (2.8.0+dfsg1-5ubuntu2.2)
Patches:
upstream: http://git.gnome.org/browse/libxml2/commit/?id=23f05e0c33987d6605387b300c4be5da2120a7ab
vendor: http://www.debian.org/security/2013/dsa-2652