CVE-2013-2877
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
10/07/2013
Last modified:
11/04/2025
Description
parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | 28.0.1500.70 (including) | |
| cpe:2.3:a:google:chrome:28.0.1500.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:google:chrome:28.0.1500.15:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz
- http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba%3Dcommit%3Bh%3De5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1
- http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2724
- http://www.debian.org/security/2013/dsa-2779
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/61050
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://code.google.com/p/chromium/issues/detail?id=229019
- ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz
- http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba%3Dcommit%3Bh%3De5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1
- http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2724
- http://www.debian.org/security/2013/dsa-2779
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/61050
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://code.google.com/p/chromium/issues/detail?id=229019



