Note: This is an archival copy of Security Sun Alert 251406 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1020044.1.
Solaris 9 Operating System
Solaris 10 Operating System
Date of Workaround Release
Date of Resolved Release
Security Vulnerabilities in the libxml2 Library Routines xmlBufferResize() and xmlSAX2Characters() May Lead to Arbitrary Code Execution or Denial of Service (DoS)
There are two security vulnerabilities in the libxml2 library (see libxml2(3)) bundled with Solaris 9 and Solaris 10 which may impact applications making use of this library. The precise impact will vary depending on the application.
The first issue is an integer overflow in the xmlBufferResize() libxml2 function (CVE-2008-4225) which may allow a local or remote unprivileged user who provides a specially crafted XML file to cause a Denial of Service (DoS) to the application which is using the libxml2 library (or potentially to the system as a whole as the application may consume excessive resources).
The second issue is an integer overflow in the xmlSAX2Characters() libxml2 function (CVE-2008-4226) which may allow a local or remote unprivileged user who provides a specially crafted XML file to cause an application crash or an arbitrary code execution with the privileges of the user running the application.
Additional information regarding these issues is available in the following documents:
CVE-2008-4225 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225
CVE-2008-4226 at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226
2. Contributing Factors
These issues can occur in the following releases:
If the first issue has been exploited, the application which makes use of the libxml2 library to process the crafted XML file may be unresponsive, possibly consuming all available CPU resources while looping. Commands such as prstat(1M) can be used to determine the utilization of system resources, for example:
$ prstat -s cpuIf the second issue has been exploited, the application which makes use of the libxml2 library to process the crafted XML file may no longer be available. Depending on the system configuration, core files may be created and application crashes may be recorded in system logs.
There are no workarounds for these issues. Please see the Resolution section below.
These issues are addressed in the following release:
Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.
09-Feb-2009: Updated Contributing Factors and Resolution sections; now Resolved
This solution has no attachment