libxmlInvalid 2.7.x - XPath Multiple Memory Corruption Vulnerabilities

Author: Chris Evans
type: remote
platform: linux
port: 
date_added: 2011-05-31  
date_updated: 2015-01-17  
verified: 1  
codes: CVE-2011-1944;OSVDB-73248  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 35810.txt  
source: https://www.securityfocus.com/bid/48056/info

The 'libxml2' library is prone to multiple memory-corruption vulnerabilities, including one that can trigger a heap-based buffer-overflow error and an integer-overflow condition.



An attacker can exploit these issues by enticing an unsuspecting user into opening a specially crafted XML file that contains a malicious XPath.



A successful attack can allow attacker-supplied code to run in the context of the application using the vulnerable library or can cause a denial-of-service condition.


//@*/preceding::node()/ancestor::node()/ancestor::foo['foo']