Vulnerabilidad en libxml2 (CVE-2012-0841)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
21/12/2012
Última modificación:
11/04/2025
Descripción
libxml2 v2.8.0 y anteriores calcula los valores de hash sin restringir la capacidad de provocar colisiones hash predecibles, lo que permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de CPU) a través datos XML modificados.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* | 2.7.8 (incluyendo) | |
cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846
- http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-0324.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/54886
- http://secunia.com/advisories/55568
- http://securitytracker.com/id?1026723=
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2417
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A150
- http://www.openwall.com/lists/oss-security/2012/02/22/1
- http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
- http://www.securityfocus.com/bid/52107
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- http://xmlsoft.org/news.html
- https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846
- http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-0324.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/54886
- http://secunia.com/advisories/55568
- http://securitytracker.com/id?1026723=
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2417
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A150
- http://www.openwall.com/lists/oss-security/2012/02/22/1
- http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
- http://www.securityfocus.com/bid/52107
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- http://xmlsoft.org/news.html
- https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of