X

The Third Party Vulnerability Resolution Blog covers CVEs and patches in Systems product suite.

Sun Alert 251406 Security Vulnerabilities in the libxml2 Library Routines xmlBufferResize() and xmlSAX2Characters() May Lead to Arbitrary Code Execution or Denial of Service (DoS)

Guest Author
Product: Solaris 9 Operating System Solaris 10 Operating System OpenSolaris

There are two security vulnerabilities in the libxml2 library (see libxml2(3)) bundled with Solaris 9 and Solaris 10 which may impact applications making use of this library. The precise impact will vary depending on the application.

The first issue is an integer overflow in the xmlBufferResize() libxml2 function (CVE-2008-4225) which may allow a local or remote unprivileged user who provides a specially crafted XML file to cause a Denial of Service (DoS) to the application which is using the libxml2 library (or potentially to the system as a whole as the application may consume excessive resources).

The second issue is an integer overflow in the xmlSAX2Characters() libxml2 function (CVE-2008-4226) which may allow a local or remote unprivileged user who provides a specially crafted XML file to cause an application crash or an arbitrary code execution with the privileges of the user running the application.

Additional information regarding these issues is available in the following documents:


State: Resolved
First released: 03-Feb-2009

Join the discussion

Comments ( 1 )
  • Gary Walters Tuesday, February 10, 2009

    how can you find the patch ID for the associated alert

Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.