ID

VAR-201208-0343


CVE

CVE-2012-2870


TITLE

Google Chrome Used in libxslt Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-004027

DESCRIPTION

libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c. (1) libxslt/pattern.c of xsltCompileLocationPathPattern function (2) libxslt/functions.c of xsltGenerateIdFunction function. A vulnerability exists in libxslt 1.1.26 and earlier versions using Google Chrome prior to 21.0.1180.89 due to improper memory management. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: libxslt security update Advisory ID: RHSA-2012:1265-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1265.html Issue date: 2012-09-13 CVE Names: CVE-2011-1202 CVE-2011-3970 CVE-2012-2825 CVE-2012-2870 CVE-2012-2871 ===================================================================== 1. Summary: Updated libxslt packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: libxslt is a library for transforming XML files into other textual formats (including HTML, plain text, and other XML representations of the underlying data) using the standard XSLT stylesheet transformation mechanism. A heap-based buffer overflow flaw was found in the way libxslt applied templates to nodes selected by certain namespaces. An attacker could use this flaw to create a malicious XSL file that, when used by an application linked against libxslt to perform an XSL transformation, could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2012-2871) Several denial of service flaws were found in libxslt. An attacker could use these flaws to create a malicious XSL file that, when used by an application linked against libxslt to perform an XSL transformation, could cause the application to crash. (CVE-2012-2825, CVE-2012-2870, CVE-2011-3970) An information leak could occur if an application using libxslt processed an untrusted XPath expression, or used a malicious XSL file to perform an XSL transformation. If combined with other flaws, this leak could possibly help an attacker bypass intended memory corruption protections. (CVE-2011-1202) All libxslt users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. All running applications linked against libxslt must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 684386 - CVE-2011-1202 libxslt: Heap address leak in XLST 788826 - CVE-2011-3970 libxslt: Out-of-bounds read when parsing certain patterns 835982 - CVE-2012-2825 libxslt: DoS when reading unexpected DTD nodes in XSLT 852935 - CVE-2012-2871 libxslt: Heap-buffer overflow caused by bad cast in XSL transforms 852937 - CVE-2012-2870 libxslt: Use-after-free when processing an invalid XPath expression 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libxslt-1.1.17-4.el5_8.3.src.rpm i386: libxslt-1.1.17-4.el5_8.3.i386.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-python-1.1.17-4.el5_8.3.i386.rpm x86_64: libxslt-1.1.17-4.el5_8.3.i386.rpm libxslt-1.1.17-4.el5_8.3.x86_64.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.x86_64.rpm libxslt-python-1.1.17-4.el5_8.3.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libxslt-1.1.17-4.el5_8.3.src.rpm i386: libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-devel-1.1.17-4.el5_8.3.i386.rpm x86_64: libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.x86_64.rpm libxslt-devel-1.1.17-4.el5_8.3.i386.rpm libxslt-devel-1.1.17-4.el5_8.3.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libxslt-1.1.17-4.el5_8.3.src.rpm i386: libxslt-1.1.17-4.el5_8.3.i386.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-devel-1.1.17-4.el5_8.3.i386.rpm libxslt-python-1.1.17-4.el5_8.3.i386.rpm ia64: libxslt-1.1.17-4.el5_8.3.i386.rpm libxslt-1.1.17-4.el5_8.3.ia64.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.ia64.rpm libxslt-devel-1.1.17-4.el5_8.3.ia64.rpm libxslt-python-1.1.17-4.el5_8.3.ia64.rpm ppc: libxslt-1.1.17-4.el5_8.3.ppc.rpm libxslt-1.1.17-4.el5_8.3.ppc64.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.ppc.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.ppc64.rpm libxslt-devel-1.1.17-4.el5_8.3.ppc.rpm libxslt-devel-1.1.17-4.el5_8.3.ppc64.rpm libxslt-python-1.1.17-4.el5_8.3.ppc.rpm s390x: libxslt-1.1.17-4.el5_8.3.s390.rpm libxslt-1.1.17-4.el5_8.3.s390x.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.s390.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.s390x.rpm libxslt-devel-1.1.17-4.el5_8.3.s390.rpm libxslt-devel-1.1.17-4.el5_8.3.s390x.rpm libxslt-python-1.1.17-4.el5_8.3.s390x.rpm x86_64: libxslt-1.1.17-4.el5_8.3.i386.rpm libxslt-1.1.17-4.el5_8.3.x86_64.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.i386.rpm libxslt-debuginfo-1.1.17-4.el5_8.3.x86_64.rpm libxslt-devel-1.1.17-4.el5_8.3.i386.rpm libxslt-devel-1.1.17-4.el5_8.3.x86_64.rpm libxslt-python-1.1.17-4.el5_8.3.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm i386: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm x86_64: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-1.1.26-2.el6_3.1.x86_64.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm i386: libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm libxslt-python-1.1.26-2.el6_3.1.i686.rpm x86_64: libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.x86_64.rpm libxslt-python-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm x86_64: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-1.1.26-2.el6_3.1.x86_64.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm x86_64: libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.x86_64.rpm libxslt-python-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm i386: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm ppc64: libxslt-1.1.26-2.el6_3.1.ppc.rpm libxslt-1.1.26-2.el6_3.1.ppc64.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.ppc.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.ppc64.rpm libxslt-devel-1.1.26-2.el6_3.1.ppc.rpm libxslt-devel-1.1.26-2.el6_3.1.ppc64.rpm s390x: libxslt-1.1.26-2.el6_3.1.s390.rpm libxslt-1.1.26-2.el6_3.1.s390x.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.s390.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.s390x.rpm libxslt-devel-1.1.26-2.el6_3.1.s390.rpm libxslt-devel-1.1.26-2.el6_3.1.s390x.rpm x86_64: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-1.1.26-2.el6_3.1.x86_64.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm i386: libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-python-1.1.26-2.el6_3.1.i686.rpm ppc64: libxslt-debuginfo-1.1.26-2.el6_3.1.ppc64.rpm libxslt-python-1.1.26-2.el6_3.1.ppc64.rpm s390x: libxslt-debuginfo-1.1.26-2.el6_3.1.s390x.rpm libxslt-python-1.1.26-2.el6_3.1.s390x.rpm x86_64: libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm libxslt-python-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm i386: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm x86_64: libxslt-1.1.26-2.el6_3.1.i686.rpm libxslt-1.1.26-2.el6_3.1.x86_64.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm libxslt-devel-1.1.26-2.el6_3.1.i686.rpm libxslt-devel-1.1.26-2.el6_3.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/libxslt-1.1.26-2.el6_3.1.src.rpm i386: libxslt-debuginfo-1.1.26-2.el6_3.1.i686.rpm libxslt-python-1.1.26-2.el6_3.1.i686.rpm x86_64: libxslt-debuginfo-1.1.26-2.el6_3.1.x86_64.rpm libxslt-python-1.1.26-2.el6_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-1202.html https://www.redhat.com/security/data/cve/CVE-2011-3970.html https://www.redhat.com/security/data/cve/CVE-2012-2825.html https://www.redhat.com/security/data/cve/CVE-2012-2870.html https://www.redhat.com/security/data/cve/CVE-2012-2871.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFQUh7JXlSAg2UNWIIRAsJmAJ9pVP2vkhEuIh3hhi9lyVfa/cnCmwCgtTiS bhFgk6Ez9OXi3ibu0HSzdxg= =c8UZ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. ============================================================================ Ubuntu Security Notice USN-1595-1 October 04, 2012 libxslt vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS Summary: Applications using libxslt could be made to crash or run programs as your login if they processed a specially crafted file. Software Description: - libxslt: XSLT processing library Details: Chris Evans discovered that libxslt incorrectly handled generate-id XPath functions. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could obtain potentially sensitive information. This issue only affected Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and Ubuntu 11.04. (CVE-2011-1202) It was discovered that libxslt incorrectly parsed certain patterns. (CVE-2011-3970) Nicholas Gregoire discovered that libxslt incorrectly handled unexpected DTD nodes. (CVE-2012-2825) Nicholas Gregoire discovered that libxslt incorrectly managed memory. (CVE-2012-2870) Nicholas Gregoire discovered that libxslt incorrectly handled certain transforms. (CVE-2012-2871) Cris Neckar discovered that libxslt incorrectly managed memory. (CVE-2012-2893) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: libxslt1.1 1.1.26-8ubuntu1.2 Ubuntu 11.10: libxslt1.1 1.1.26-7ubuntu0.1 Ubuntu 11.04: libxslt1.1 1.1.26-6ubuntu0.1 Ubuntu 10.04 LTS: libxslt1.1 1.1.26-1ubuntu1.1 Ubuntu 8.04 LTS: libxslt1.1 1.1.22-1ubuntu1.3 In general, a standard system update will make all the necessary changes. Background ========== libxslt is the XSLT C library developed for the GNOME project. XSLT is an XML language to define transformations for XML. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/libxslt < 1.1.28 >= 1.1.28 Description =========== Multiple vulnerabilities have been found in libxslt: * Multiple errors exist in pattern.c and functions.c (CVE-2012-2870, CVE-2012-6139). * A double-free error exists in templates.c (CVE-2012-2893). * A NULL pointer dereference in keys.c (CVE-2012-6139). * An error in handling stylesheets containing DTDs (CVE-2013-4520). Workaround ========== There is no known workaround at this time. Resolution ========== All libxslt users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.28" Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages. References ========== [ 1 ] CVE-2012-2870 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2870 [ 2 ] CVE-2012-2893 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2893 [ 3 ] CVE-2012-6139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6139 [ 4 ] CVE-2013-4520 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4520 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201401-07.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . For the stable distribution (squeeze), these problems have been fixed in version 1.1.26-6+squeeze2. For the unstable distribution (sid), these problems have been fixed in version 1.1.26-14. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-09-20-1 Apple TV 6.0 Apple TV 6.0 is now available and addresses the following: Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JBIG2 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1025 : Felix Groebert of the Google Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of Sorenson encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft) working with HP's Zero Day Initiative Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update added the involved sub-CA certificate to OS X's list of untrusted certificates. CVE-ID CVE-2013-5134 Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker who has arbitrary code execution on a device may be able to persist code execution across reboots Description: Multiple buffer overflows existed in dyld's openSharedCacheFile() function. These issues were addressed through improved bounds checking. CVE-ID CVE-2013-3950 : Stefan Esser Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1026 : Felix Groebert of the Google Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious local application could cause an unexpected system termination Description: A null pointer dereference existed in IOCatalogue. The issue was addressed through additional type checking. CVE-ID CVE-2013-5138 : Will Estes Apple TV Available for: Apple TV 2nd generation and later Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-5139 : @dent1zt Apple TV Available for: Apple TV 2nd generation and later Impact: A remote attacker can cause a device to unexpectedly restart Description: Sending an invalid packet fragment to a device can cause a kernel assert to trigger, leading to a device restart. The issue was addressed through additional validation of packet fragments. CVE-ID CVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymous researcher working with CERT-FI, Antti LevomAki and Lauri Virtanen of Vulnerability Analysis Group, Stonesoft Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker on a local network can cause a denial of service Description: An attacker on a local network can send specially crafted IPv6 ICMP packets and cause high CPU load. The issue was addressed by rate limiting ICMP packets before verifying their checksum. CVE-ID CVE-2011-2391 : Marc Heuse Apple TV Available for: Apple TV 2nd generation and later Impact: Kernel stack memory may be disclosed to local users Description: An information disclosure issue existed in the msgctl and segctl APIs. This issue was addressed by initializing data structures returned from the kernel. CVE-ID CVE-2013-5142 : Kenzley Alphonse of Kenx Technology, Inc Apple TV Available for: Apple TV 2nd generation and later Impact: Unprivileged processes could get access to the contents of kernel memory which could lead to privilege escalation Description: An information disclosure issue existed in the mach_port_space_info API. This issue was addressed by initializing the iin_collision field in structures returned from the kernel. CVE-ID CVE-2013-3953 : Stefan Esser Apple TV Available for: Apple TV 2nd generation and later Impact: Unprivileged processes may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: A memory corruption issue existed in the handling of arguments to the posix_spawn API. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-3954 : Stefan Esser Apple TV Available for: Apple TV 2nd generation and later Impact: An unauthorized process may modify the set of loaded kernel extensions Description: An issue existed in kextd's handling of IPC messages from unauthenticated senders. This issue was addressed by adding additional authorization checks. CVE-ID CVE-2013-5145 : "Rainbow PRISM" Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libxml. These issues were addressed by updating libxml to version 2.9.0. CVE-ID CVE-2011-3102 : Juri Aedla CVE-2012-0841 CVE-2012-2807 : Juri Aedla CVE-2012-5134 : Google Chrome Security Team (Juri Aedla) Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28. CVE-ID CVE-2012-2825 : Nicolas Gregoire CVE-2012-2870 : Nicolas Gregoire CVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas Gregoire Apple TV Available for: Apple TV 2nd generation and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-0879 : Atte Kettunen of OUSPG CVE-2013-0991 : Jay Civelli of the Chromium development community CVE-2013-0992 : Google Chrome Security Team (Martin Barbella) CVE-2013-0993 : Google Chrome Security Team (Inferno) CVE-2013-0994 : David German of Google CVE-2013-0995 : Google Chrome Security Team (Inferno) CVE-2013-0996 : Google Chrome Security Team (Inferno) CVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative CVE-2013-0998 : pa_kt working with HP's Zero Day Initiative CVE-2013-0999 : pa_kt working with HP's Zero Day Initiative CVE-2013-1000 : Fermin J. Serna of the Google Security Team CVE-2013-1001 : Ryan Humenick CVE-2013-1002 : Sergey Glazunov CVE-2013-1003 : Google Chrome Security Team (Inferno) CVE-2013-1004 : Google Chrome Security Team (Martin Barbella) CVE-2013-1005 : Google Chrome Security Team (Martin Barbella) CVE-2013-1006 : Google Chrome Security Team (Martin Barbella) CVE-2013-1007 : Google Chrome Security Team (Inferno) CVE-2013-1008 : Sergey Glazunov CVE-2013-1010 : miaubiz CVE-2013-1011 CVE-2013-1037 : Google Chrome Security Team CVE-2013-1038 : Google Chrome Security Team CVE-2013-1039 : own-hero Research working with iDefense VCP CVE-2013-1040 : Google Chrome Security Team CVE-2013-1041 : Google Chrome Security Team CVE-2013-1042 : Google Chrome Security Team CVE-2013-1043 : Google Chrome Security Team CVE-2013-1044 : Apple CVE-2013-1045 : Google Chrome Security Team CVE-2013-1046 : Google Chrome Security Team CVE-2013-1047 : miaubiz CVE-2013-2842 : Cyril Cattiaux CVE-2013-5125 : Google Chrome Security Team CVE-2013-5126 : Apple CVE-2013-5127 : Google Chrome Security Team CVE-2013-5128 : Apple Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About"

Trust: 2.43

sources: NVD: CVE-2012-2870 // JVNDB: JVNDB-2012-004027 // VULHUB: VHN-56151 // VULMON: CVE-2012-2870 // PACKETSTORM: 116519 // PACKETSTORM: 117306 // PACKETSTORM: 117132 // PACKETSTORM: 121115 // PACKETSTORM: 124741 // PACKETSTORM: 117159 // PACKETSTORM: 123339

AFFECTED PRODUCTS

vendor:xmlsoftmodel:libxsltscope:lteversion:1.1.26

Trust: 1.8

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.49

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.31

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.60

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.84

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:6.1.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.77

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.54

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.56

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.70

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.82

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.74

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.76

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:21.0.1180.88

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.23

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.47

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.36

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.78

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.63

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.41

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.75

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.24

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.16

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.37

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.38

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.39

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.34

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.69

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.20

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.64

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.22

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.71

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.51

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.12

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.87

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.85

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.61

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.2

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.9

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.80

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.35

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.59

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.48

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.79

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.83

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.52

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.18

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.57

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.68

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.19

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.10

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.15

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.55

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.33

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.62

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.86

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.11

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.8

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.81

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.53

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.73

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.46

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.32

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.13

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.14

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.72

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.21

Trust: 1.0

vendor:xmlsoftmodel:libxsltscope:eqversion:1.1.17

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:21.0.1180.50

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:21.0.1180.89

Trust: 0.8

vendor:applemodel:tvscope:ltversion:6.0 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows 7)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows 8)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows vista)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows xp sp2 or later )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:6.1.4

Trust: 0.6

sources: CNNVD: CNNVD-201208-693 // JVNDB: JVNDB-2012-004027 // NVD: CVE-2012-2870

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2870
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-2870
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-693
value: MEDIUM

Trust: 0.6

VULHUB: VHN-56151
value: MEDIUM

Trust: 0.1

VULMON: CVE-2012-2870
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-2870
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-56151
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56151 // VULMON: CVE-2012-2870 // CNNVD: CNNVD-201208-693 // JVNDB: JVNDB-2012-004027 // NVD: CVE-2012-2870

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-56151 // JVNDB: JVNDB-2012-004027 // NVD: CVE-2012-2870

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 117306 // PACKETSTORM: 117132 // PACKETSTORM: 121115 // CNNVD: CNNVD-201208-693

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201208-693

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-004027

PATCH

title:APPLE-SA-2013-10-22-8url:http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html

Trust: 0.8

title:APPLE-SA-2013-09-20-1url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00008.html

Trust: 0.8

title:APPLE-SA-2013-09-18-2url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html

Trust: 0.8

title:HT6001url:http://support.apple.com/kb/HT6001

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935

Trust: 0.8

title:HT6001url:http://support.apple.com/kb/HT6001?viewlocale=ja_JP

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934?viewlocale=ja_JP

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935?viewlocale=ja_JP

Trust: 0.8

title:Log of /trunk/src/third_party/libxslt/libxslt/pattern.curl:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?view=log

Trust: 0.8

title:Diff of /trunk/src/third_party/libxslt/libxslt/pattern.curl:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?r1=118654&r2=150123

Trust: 0.8

title:Log of /trunk/src/third_party/libxslt/libxslt/functions.curl:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?view=log

Trust: 0.8

title:Diff of /trunk/src/third_party/libxslt/libxslt/functions.curl:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?r1=75684&r2=149998

Trust: 0.8

title:Issue 10830177: Handle a bad XSLT expression better.url:https://chromiumcodereview.appspot.com/10830177

Trust: 0.8

title:Issue 10823168: Fix harmless memory error in generate-id.url:https://chromiumcodereview.appspot.com/10823168

Trust: 0.8

title:DSA-2555url:http://www.debian.org/security/2012/dsa-2555

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2012/08/stable-channel-update_30.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:openSUSE-SU-2012:1215url:http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html

Trust: 0.8

title:MDVSA-2012:164url:http://www.mandriva.com/security/advisories?name=MDVSA-2012:164

Trust: 0.8

title:Multiple vulnerabilities in libxslturl:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_libxslt

Trust: 0.8

title:Top Pageurl:http://www.xmlsoft.org/

Trust: 0.8

title:GoogleChromesetup25.0.1323.1url:http://123.124.177.30/web/xxk/bdxqById.tag?id=44457

Trust: 0.6

title:Red Hat: Important: libxslt security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20121265 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxslt: Three security issuesurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=3db888241598e632a57d140334ad7c21

Trust: 0.1

title:Debian Security Advisories: DSA-2555-1 libxslt -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=0bbfcdccfdcee3404afcbd7baf6cad17

Trust: 0.1

title:Ubuntu Security Notice: libxslt vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1595-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2012-123url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2012-123

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/sambacha/mirror-radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/StephenHaruna/RADAMSA

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/benoit-a/radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/g60ocR/radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/sunzu94/radamsa-Fuzzer

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/nqwang/radamsa

Trust: 0.1

title:A Crash Course to Radamsa FAQurl:https://github.com/Hwangtaewon/radamsa

Trust: 0.1

sources: VULMON: CVE-2012-2870 // CNNVD: CNNVD-201208-693 // JVNDB: JVNDB-2012-004027

EXTERNAL IDS

db:NVDid:CVE-2012-2870

Trust: 3.3

db:SECUNIAid:50838

Trust: 1.2

db:SECUNIAid:54886

Trust: 1.2

db:JVNid:JVNVU95174988

Trust: 0.8

db:JVNid:JVNVU98681940

Trust: 0.8

db:JVNid:JVNVU94321146

Trust: 0.8

db:JVNDBid:JVNDB-2012-004027

Trust: 0.8

db:CNNVDid:CNNVD-201208-693

Trust: 0.7

db:AUSCERTid:ESB-2023.3732

Trust: 0.6

db:PACKETSTORMid:117159

Trust: 0.2

db:PACKETSTORMid:124741

Trust: 0.2

db:VULHUBid:VHN-56151

Trust: 0.1

db:VULMONid:CVE-2012-2870

Trust: 0.1

db:PACKETSTORMid:116519

Trust: 0.1

db:PACKETSTORMid:117306

Trust: 0.1

db:PACKETSTORMid:117132

Trust: 0.1

db:PACKETSTORMid:121115

Trust: 0.1

db:PACKETSTORMid:123339

Trust: 0.1

sources: VULHUB: VHN-56151 // VULMON: CVE-2012-2870 // PACKETSTORM: 116519 // PACKETSTORM: 117306 // PACKETSTORM: 117132 // PACKETSTORM: 121115 // PACKETSTORM: 124741 // PACKETSTORM: 117159 // PACKETSTORM: 123339 // CNNVD: CNNVD-201208-693 // JVNDB: JVNDB-2012-004027 // NVD: CVE-2012-2870

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00006.html

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2013/oct/msg00009.html

Trust: 1.2

url:http://code.google.com/p/chromium/issues/detail?id=138672

Trust: 1.2

url:http://code.google.com/p/chromium/issues/detail?id=140368

Trust: 1.2

url:http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html

Trust: 1.2

url:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?view=log

Trust: 1.2

url:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?view=log

Trust: 1.2

url:http://support.apple.com/kb/ht5934

Trust: 1.2

url:http://support.apple.com/kb/ht6001

Trust: 1.2

url:https://chromiumcodereview.appspot.com/10823168

Trust: 1.2

url:https://chromiumcodereview.appspot.com/10830177

Trust: 1.2

url:http://www.debian.org/security/2012/dsa-2555

Trust: 1.2

url:http://www.mandriva.com/security/advisories?name=mdvsa-2012:164

Trust: 1.2

url:http://secunia.com/advisories/50838

Trust: 1.2

url:http://secunia.com/advisories/54886

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html

Trust: 1.2

url:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?r1=75684&r2=149998

Trust: 1.1

url:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?r1=118654&r2=150123

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2870

Trust: 1.0

url:http://jvn.jp/cert/jvnvu95174988/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94321146/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu98681940/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2870

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2012-2870

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2012-2871

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3732

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2012-2893

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2012-2825

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2011-1202

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3970

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2893

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2871

Trust: 0.2

url:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/functions.c?r1=75684&amp;r2=149998

Trust: 0.1

url:http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxslt/libxslt/pattern.c?r1=118654&amp;r2=150123

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2012:1265

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/1595-1/

Trust: 0.1

url:https://www.debian.org/security/./dsa-2555

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1202.html

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3970.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2012-1265.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-2825.html

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-2870.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-2871.html

Trust: 0.1

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1202

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxslt/1.1.26-1ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxslt/1.1.26-7ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxslt/1.1.26-8ubuntu1.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxslt/1.1.22-1ubuntu1.3

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-1595-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxslt/1.1.26-6ubuntu0.1

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2825

Trust: 0.1

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2870

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4520

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201401-07.xml

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-6139

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-4520

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2893

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0997

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0841

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1001

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0993

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1004

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0994

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0998

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1006

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3102

Trust: 0.1

sources: VULHUB: VHN-56151 // VULMON: CVE-2012-2870 // PACKETSTORM: 116519 // PACKETSTORM: 117306 // PACKETSTORM: 117132 // PACKETSTORM: 121115 // PACKETSTORM: 124741 // PACKETSTORM: 117159 // PACKETSTORM: 123339 // CNNVD: CNNVD-201208-693 // JVNDB: JVNDB-2012-004027 // NVD: CVE-2012-2870

CREDITS

Mandriva

Trust: 0.2

sources: PACKETSTORM: 117306 // PACKETSTORM: 121115

SOURCES

db:VULHUBid:VHN-56151
db:VULMONid:CVE-2012-2870
db:PACKETSTORMid:116519
db:PACKETSTORMid:117306
db:PACKETSTORMid:117132
db:PACKETSTORMid:121115
db:PACKETSTORMid:124741
db:PACKETSTORMid:117159
db:PACKETSTORMid:123339
db:CNNVDid:CNNVD-201208-693
db:JVNDBid:JVNDB-2012-004027
db:NVDid:CVE-2012-2870

LAST UPDATE DATE

2026-04-18T22:23:02.504000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56151date:2014-01-28T00:00:00
db:VULMONid:CVE-2012-2870date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201208-693date:2023-06-30T00:00:00
db:JVNDBid:JVNDB-2012-004027date:2014-02-03T00:00:00
db:NVDid:CVE-2012-2870date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-56151date:2012-08-31T00:00:00
db:VULMONid:CVE-2012-2870date:2012-08-31T00:00:00
db:PACKETSTORMid:116519date:2012-09-14T01:52:23
db:PACKETSTORMid:117306date:2012-10-11T15:06:42
db:PACKETSTORMid:117132date:2012-10-05T02:43:12
db:PACKETSTORMid:121115date:2013-04-07T15:05:48
db:PACKETSTORMid:124741date:2014-01-10T22:09:38
db:PACKETSTORMid:117159date:2012-10-06T00:48:11
db:PACKETSTORMid:123339date:2013-09-20T20:54:13
db:CNNVDid:CNNVD-201208-693date:2012-08-31T00:00:00
db:JVNDBid:JVNDB-2012-004027date:2012-09-04T00:00:00
db:NVDid:CVE-2012-2870date:2012-08-31T19:55:01.077