Note: This is an archival copy of Security Sun Alert 251406 as previously published on http://sunsolve.sun.com. Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020044.1. |
Category Security Release Phase Resolved 6778313 Product Solaris 9 Operating System Solaris 10 Operating System OpenSolaris Date of Workaround Release 03-Feb-2009 Date of Resolved Release 09-Feb-2009 Security Vulnerabilities in the libxml2 Library Routines xmlBufferResize() and xmlSAX2Characters() May Lead to Arbitrary Code Execution or Denial of Service (DoS) 1. Impact There are two security vulnerabilities in the libxml2 library (see libxml2(3)) bundled with Solaris 9 and Solaris 10 which may impact applications making use of this library. The precise impact will vary depending on the application. The first issue is an integer overflow in the xmlBufferResize() libxml2 function (CVE-2008-4225) which may allow a local or remote unprivileged user who provides a specially crafted XML file to cause a Denial of Service (DoS) to the application which is using the libxml2 library (or potentially to the system as a whole as the application may consume excessive resources). The second issue is an integer overflow in the xmlSAX2Characters() libxml2 function (CVE-2008-4226) which may allow a local or remote unprivileged user who provides a specially crafted XML file to cause an application crash or an arbitrary code execution with the privileges of the user running the application. Additional information regarding these issues is available in the following documents: CVE-2008-4225 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225
CVE-2008-4226 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226 2. Contributing Factors These issues can occur in the following releases: SPARC Platform
3. Symptoms If the first issue has been exploited, the application which makes use of the libxml2 library to process the crafted XML file may be unresponsive, possibly consuming all available CPU resources while looping. Commands such as prstat(1M) can be used to determine the utilization of system resources, for example: $ prstat -s cpuIf the second issue has been exploited, the application which makes use of the libxml2 library to process the crafted XML file may no longer be available. Depending on the system configuration, core files may be created and application crashes may be recorded in system logs. 4. Workaround There are no workarounds for these issues. Please see the Resolution section below. 5. Resolution These issues are addressed in the following release: SPARC Platform
This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. Modification History 09-Feb-2009: Updated Contributing Factors and Resolution sections; now Resolved References125731-04125732-04 114014-22 114015-22 Attachments This solution has no attachment |
|