Pardus Linux Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service).
64c355dcce91e0b0f828984ad3723412eb26fdf00f38a5667c4504d985959f28
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-28 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-08-25
Severity: 3
Type: Remote
------------------------------------------------------------------------
Summary
=======
A vulnerability has been reported in Libxml2, which can be exploited by
malicious people to cause a DoS (Denial of Service).
Description
===========
The vulnerability is caused due to an recursion error when processing
certain XML content. This can be exploited to e.g. exhaust all available
memory and CPU resources by tricking an application using Libxml2 into
processing specially crafted XML documents.
Affected packages:
Pardus 2008:
libxml2, all before 2.6.32-9-5
Pardus 2007:
libxml2, all before 2.6.31-8-6
Resolution
==========
There are update(s) for libxml2. You can update them via Package Manager
or with a single command from console:
Pardus 2008:
pisi up libxml2
Pardus 2007:
pisi up libxml2
References
==========
* http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281
* http://secunia.com/advisories/31558/
* https://rhn.redhat.com/errata/RHSA-2008-0836.html
* http://mail.gnome.org/archives/xml/2008-August/msg00034.html
------------------------------------------------------------------------
--
Pınar Yanardağ
Pardus Security Team
http://security.pardus.org.tr