[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-3451Date: (C)2015-05-11   (M)2023-12-22


The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-74333
DSA-3243
FEDORA-2015-7115
FEDORA-2015-7258
MDVSA-2015:231
USN-2592-1
http://www.openwall.com/lists/oss-security/2015/04/25/2
http://www.openwall.com/lists/oss-security/2015/04/30/1
http://advisories.mageia.org/MGASA-2015-0199.html
http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/Changes
https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30/raw/
openSUSE-SU-2015:1506

CPE    9
cpe:/o:opensuse:opensuse:13.1
cpe:/o:fedoraproject:fedora:20
cpe:/o:fedoraproject:fedora:21
cpe:/o:debian:debian_linux:7.0
...
CWE    1
CWE-611
OVAL    5
oval:org.secpod.oval:def:108849
oval:org.secpod.oval:def:108828
oval:org.secpod.oval:def:52146
oval:org.secpod.oval:def:24345
...

© SecPod Technologies