Public Date:
2012-A-0153, 2012-A-0073
709747: CVE-2011-1944 libxml, libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets

The MITRE CVE dictionary describes this issue as:

Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.

Find out more about CVE-2011-1944 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5.1
Base Metrics AV:N/AC:H/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (libxml2) RHSA-2012:0017 2012-01-11
Red Hat Enterprise Linux version 6 (mingw32-libxml2) RHSA-2013:0217 2013-01-31
Red Hat Enterprise Linux version 6 (libxml2) RHSA-2011:1749 2011-12-05

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 4 libxml2 Will not fix