~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
<?xml version='1.0' encoding='UTF-8'?>
<nvd xmlns="http://nvd.nist.gov/feeds/cve/1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" nvd_xml_version="1.2" pub_date="2008-12-02" xsi:schemaLocation="http://nvd.nist.gov/feeds/cve/1.2 http://nvd.nist.gov/schema/nvdcve.xsd">
    <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2020-0001" seq="2020-0001" severity="High" type="CVE" published="2008-11-25" CVSS_version="2.0" CVSS_score="10.0" modified="2008-11-26">
        <desc>
            <descript source="cve">Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.</descript>
        </desc>
        <loss_types>
            <avail />
            <conf />
            <int />
            <sec_prot admin="1" />
        </loss_types>
        <range>
            <network />
        </range>
        <refs>
            <ref source="CONFIRM" patch="1" url="https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9">https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9</ref>
            <ref source="CONFIRM" patch="1" url="https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10">https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10</ref>
            <ref source="DEBIAN" patch="1" url="http://www.debian.org/security/2008/dsa-1666">DSA-1666</ref>
            <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html">FEDORA-2008-9773</ref>
            <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html">FEDORA-2008-9729</ref>
            <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=470466">https://bugzilla.redhat.com/show_bug.cgi?id=470466</ref>
            <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-673-1">USN-673-1</ref>
            <ref source="BID" url="http://www.securityfocus.com/bid/32326">32326</ref>
            <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0988.html">RHSA-2008:0988</ref>
            <ref source="OSVDB" url="http://www.osvdb.org/49993">49993</ref>
            <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:231">MDVSA-2008:231</ref>
            <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/3176" adv="1">ADV-2008-3176</ref>
            <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0325">http://wiki.rpath.com/Advisories:rPSA-2008-0325</ref>
            <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.473974">SSA:2008-324-01</ref>
            <ref source="SECTRACK" url="http://securitytracker.com/id?1021238">1021238</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32811" adv="1">32811</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32807" adv="1">32807</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32802" adv="1">32802</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32773" adv="1">32773</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32766" adv="1">32766</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32764" adv="1">32764</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32762" adv="1">32762</ref>
        </refs>
        <vuln_soft>
            <prod vendor="xmlsoft" name="libxml">
                <vers num="2.7.2" />
            </prod>
        </vuln_soft>
    </entry>
    <entry CVSS_vector="(AV:N/AC:L/Au:N/C:C/I:C/A:C)" CVSS_base_score="10.0" CVSS_exploit_subscore="10.0" CVSS_impact_subscore="10.0" name="CVE-2020-0002" seq="2020-0001" severity="High" type="CVE" published="2008-11-25" CVSS_version="2.0" CVSS_score="10.0" modified="2008-11-26">
        <desc>
            <descript source="cve">(Fake part II) Integer overflow in the xmlSAX2Characters function in libxml3 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document. Related to CVE-2020-0001</descript>
        </desc>
        <loss_types>
            <avail />
            <conf />
            <int />
            <sec_prot admin="1" />
        </loss_types>
        <range>
            <network />
        </range>
        <refs>
            <ref source="CONFIRM" patch="1" url="https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9">https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9</ref>
            <ref source="CONFIRM" patch="1" url="https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10">https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10</ref>
            <ref source="DEBIAN" patch="1" url="http://www.debian.org/security/2008/dsa-1666">DSA-1666</ref>
            <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html">FEDORA-2008-9773</ref>
            <ref source="FEDORA" url="https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html">FEDORA-2008-9729</ref>
            <ref source="CONFIRM" url="https://bugzilla.redhat.com/show_bug.cgi?id=470466">https://bugzilla.redhat.com/show_bug.cgi?id=470466</ref>
            <ref source="UBUNTU" url="http://www.ubuntu.com/usn/usn-673-1">USN-673-1</ref>
            <ref source="BID" url="http://www.securityfocus.com/bid/32326">32326</ref>
            <ref source="REDHAT" url="http://www.redhat.com/support/errata/RHSA-2008-0988.html">RHSA-2008:0988</ref>
            <ref source="OSVDB" url="http://www.osvdb.org/49993">49993</ref>
            <ref source="MANDRIVA" url="http://www.mandriva.com/security/advisories?name=MDVSA-2008:231">MDVSA-2008:231</ref>
            <ref source="FRSIRT" url="http://www.frsirt.com/english/advisories/2008/3176" adv="1">ADV-2008-3176</ref>
            <ref source="CONFIRM" url="http://wiki.rpath.com/Advisories:rPSA-2008-0325">http://wiki.rpath.com/Advisories:rPSA-2008-0325</ref>
            <ref source="SLACKWARE" url="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2008&amp;m=slackware-security.473974">SSA:2008-324-01</ref>
            <ref source="SECTRACK" url="http://securitytracker.com/id?1021238">1021238</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32811" adv="1">32811</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32807" adv="1">32807</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32802" adv="1">32802</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32773" adv="1">32773</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32766" adv="1">32766</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32764" adv="1">32764</ref>
            <ref source="SECUNIA" url="http://secunia.com/advisories/32762" adv="1">32762</ref>
        </refs>
        <vuln_soft>
            <prod vendor="xmlsoft" name="libxml">
                <vers num="2.7.2" />
            </prod>
        </vuln_soft>
    </entry>
</nvd>