Skip to main content

Sun Solaris Libxml2 Data Processing Integer Overflow Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 5 Feb 2009 5334 Views

RISK: Medium Risk

Two vulnerabilities have been identified in Sun Solaris, which could be exploited by attackers to cause a denial of service or compromise a vulnerable system.

1. An integer overflow error in the "xmlSAX2Characters()" function when processing an overly large XML file, which could cause a memory corruption potentially leading to arbitrary code execution.

2. An integer overflow error in the "xmlBufferResize()" function when processing an overly large XML file, which could cause an infinite loop, leading to a denial of service condition.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Sun Solaris 9
  • Sun Solaris 10
  • Sun OpenSolaris

Solutions

Do not process untrusted xml files.


Vulnerability Identifier


Source


Related Link