CVE-2012-6139
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/04/2013
Last modified:
11/04/2025
Description
libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:* | 1.1.27 (including) | |
| cpe:2.3:a:xmlsoft:libxslt:0.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxslt:0.13.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html
- http://secunia.com/advisories/52745
- http://secunia.com/advisories/52805
- http://secunia.com/advisories/52813
- http://secunia.com/advisories/52884
- http://www.debian.org/security/2013/dsa-2654
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A141
- http://www.securitytracker.com/id/1028338
- http://www.ubuntu.com/usn/USN-1784-1
- http://xmlsoft.org/XSLT/news.html
- https://bugzilla.gnome.org/show_bug.cgi?id=685328
- https://bugzilla.gnome.org/show_bug.cgi?id=685330
- https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833
- https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107
- https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html
- https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html
- http://secunia.com/advisories/52745
- http://secunia.com/advisories/52805
- http://secunia.com/advisories/52813
- http://secunia.com/advisories/52884
- http://www.debian.org/security/2013/dsa-2654
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A141
- http://www.securitytracker.com/id/1028338
- http://www.ubuntu.com/usn/USN-1784-1
- http://xmlsoft.org/XSLT/news.html
- https://bugzilla.gnome.org/show_bug.cgi?id=685328
- https://bugzilla.gnome.org/show_bug.cgi?id=685330
- https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833
- https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107
- https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html
- https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html



