Executive Summary

Informations
NameCVE-2004-0989First vendor Publication2005-03-01
VendorCveLast vendor Modification2010-08-21

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides administrator access : Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0989

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-47Buffer Overflow via Parameter Expansion

CWE : Common Weakness Enumeration

idName
CWE-130Improper Handling of Length Parameter Inconsistency

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1173
 
Oval ID: oval:org.mitre.oval:def:1173
Title: Multiple Buffer Overflows in libXML2
Description: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0989
Version: 1
Platform(s): Red Hat Enterprise Linux 3
Product(s): libxml2
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10505
 
Oval ID: oval:org.mitre.oval:def:10505
Title: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
Description: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
Family: unix Class: vulnerability
Reference(s): CVE-2004-0989
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application9
Application1
Os1
Os2
Os2

OpenVAS Exploits

DateDescription
2009-10-10Name : SLES9: Security update for libxml
File : nvt/sles9p5016394.nasl
2009-09-02Name : Fedora Core 11 FEDORA-2009-8582 (libxml)
File : nvt/fcore_2009_8582.nasl
2009-09-02Name : Fedora Core 10 FEDORA-2009-8594 (libxml)
File : nvt/fcore_2009_8594.nasl
2008-09-24Name : Gentoo Security Advisory GLSA 200411-05 (libxml2)
File : nvt/glsa_200411_05.nasl
2008-09-04Name : FreeBSD Ports: libxml
File : nvt/freebsd_libxml.nasl
2008-01-17Name : Debian Security Advisory DSA 582-1 (libxml, libxml2)
File : nvt/deb_582_1.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
11324libxml2 Proxy FTP URL Processing Overflow
11180libxml2 DNS Reply Overflows
11179libxml2 FTP URL Processing Overflow

Nessus® Vulnerability Scanner

DateDescription
2009-09-24Name : The remote SuSE 9 host is missing a security-related patch.
File : suse9_9579.nasl - Type : ACT_GATHER_INFO
2009-08-18Name : The remote Fedora host is missing a security update.
File : fedora_2009-8582.nasl - Type : ACT_GATHER_INFO
2009-08-18Name : The remote Fedora host is missing a security update.
File : fedora_2009-8594.nasl - Type : ACT_GATHER_INFO
2009-04-23Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_9ff4c91e328c11d9a9e70001020eed82.nasl - Type : ACT_GATHER_INFO
2006-07-03Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2004-650.nasl - Type : ACT_GATHER_INFO
2006-01-15Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-89-1.nasl - Type : ACT_GATHER_INFO
2005-01-26Name : The remote host is missing a Mac OS X update that fixes a security issue.
File : macosx_SecUpd2005-001.nasl - Type : ACT_GATHER_INFO
2004-12-17Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-650.nasl - Type : ACT_GATHER_INFO
2004-11-13Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-615.nasl - Type : ACT_GATHER_INFO
2004-11-10Name : The remote Debian host is missing a security-related update.
File : debian_DSA-582.nasl - Type : ACT_GATHER_INFO
2004-11-05Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-127.nasl - Type : ACT_GATHER_INFO
2004-11-03Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200411-05.nasl - Type : ACT_GATHER_INFO

Internal Sources (Detail)

SourceUrl
APPLEhttp://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html
BIDhttp://www.securityfocus.com/bid/11526
BUGTRAQhttp://marc.theaimsgroup.com/?l=bugtraq&m=109880813013482&w=2
CIAChttp://www.ciac.org/ciac/bulletins/p-029.shtml
CONECTIVAhttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890
DEBIANhttp://www.debian.org/security/2004/dsa-582
GENTOOhttp://www.gentoo.org/security/en/glsa/glsa-200411-05.xml
OSVDBhttp://www.osvdb.org/11179
http://www.osvdb.org/11180
http://www.osvdb.org/11324
REDHAThttp://www.redhat.com/support/errata/RHSA-2004-615.html
http://www.redhat.com/support/errata/RHSA-2004-650.html
SECTRACKhttp://securitytracker.com/id?1011941
SECUNIAhttp://secunia.com/advisories/13000
SUSEhttp://www.novell.com/linux/security/advisories/2005_01_sr.html
UBUNTUhttp://marc.theaimsgroup.com/?l=bugtraq&m=110972110516151&w=2
XFhttp://xforce.iss.net/xforce/xfdb/17870
http://xforce.iss.net/xforce/xfdb/17872
http://xforce.iss.net/xforce/xfdb/17875
http://xforce.iss.net/xforce/xfdb/17876

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2014-02-17 10:28:14
  • Multiple Updates
2013-05-11 11:43:35
  • Multiple Updates