CVE-2013-0339
Published: 26 February 2013
libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because libxml2 already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed and each affected application would need its own CVE.
Priority
Status
Package | Release | Status |
---|---|---|
libxml2 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
lucid |
Released
(2.7.6.dfsg-1ubuntu1.9)
|
|
precise |
Released
(2.7.8.dfsg-5.1ubuntu4.5)
|
|
quantal |
Released
(2.8.0+dfsg1-5ubuntu2.3)
|
|
raring |
Not vulnerable
(2.9.0+dfsg1-4ubuntu4.1)
|
|
Patches: upstream: https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f |