CVE-2012-2870
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
31/08/2012
Last modified:
11/04/2025
Description
libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* | 6.1.4 (including) | |
| cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://code.google.com/p/chromium/issues/detail?id=138672
- http://code.google.com/p/chromium/issues/detail?id=140368
- http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html
- http://secunia.com/advisories/50838
- http://secunia.com/advisories/54886
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?r1=75684&r2=149998
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?view=log
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?r1=118654&r2=150123
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?view=log
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2555
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A164
- https://chromiumcodereview.appspot.com/10823168
- https://chromiumcodereview.appspot.com/10830177
- http://code.google.com/p/chromium/issues/detail?id=138672
- http://code.google.com/p/chromium/issues/detail?id=140368
- http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html
- http://secunia.com/advisories/50838
- http://secunia.com/advisories/54886
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?r1=75684&r2=149998
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?view=log
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?r1=118654&r2=150123
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?view=log
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2555
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A164
- https://chromiumcodereview.appspot.com/10823168
- https://chromiumcodereview.appspot.com/10830177



