CVE-2011-3919

Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.

Published at
2012-01-07T11:55Z
4503 days ago
Modified
2020-05-07T19:05Z
1460 days ago
CWE-787
Problem type

References


URLType
googlechromereleases.blogspot.com
http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html
CONFIRM
code.google.com
http://code.google.com/p/chromium/issues/detail?id=107128
CONFIRM
MDVSA-2012:005
http://www.mandriva.com/security/advisories?name=MDVSA-2012:005
MANDRIVA
1026487
http://www.securitytracker.com/id?1026487
SECTRACK
47449
http://secunia.com/advisories/47449
SECUNIA
51300
http://www.securityfocus.com/bid/51300
BID
support.apple.com
http://support.apple.com/kb/HT5281
CONFIRM
APPLE-SA-2012-05-09-1
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
APPLE
APPLE-SA-2012-09-19-1
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
APPLE
support.apple.com
http://support.apple.com/kb/HT5503
CONFIRM
DSA-2394
http://www.debian.org/security/2012/dsa-2394
DEBIAN
RHSA-2013:0217
http://rhn.redhat.com/errata/RHSA-2013-0217.html
REDHAT
SUSE-SU-2013:1627
http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
SUSE
55568
http://secunia.com/advisories/55568
SECUNIA
oval:org.mitre.oval:def:14504
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14504
OVAL

GET https://vulnerabilitydata.com/api/details/CVE-2011-3919

{
	"id": "CVE-2011-3919",
	"published_date": "2012-01-07T11:55Z",
	"last_modified_date": "2020-05-07T19:05Z",
	"assigner": "security@google.com",
	"description": "Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.",
	"references": [
		{
			"url": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html",
			"name": "http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "http://code.google.com/p/chromium/issues/detail?id=107128",
			"name": "http://code.google.com/p/chromium/issues/detail?id=107128",
			"refsource": "CONFIRM",
			"tags": [
				"Exploit",
				"Issue Tracking",
				"Patch",
				"Vendor Advisory"
			]
		},
		{
			"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:005",
			"name": "MDVSA-2012:005",
			"refsource": "MANDRIVA",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.securitytracker.com/id?1026487",
			"name": "1026487",
			"refsource": "SECTRACK",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://secunia.com/advisories/47449",
			"name": "47449",
			"refsource": "SECUNIA",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.securityfocus.com/bid/51300",
			"name": "51300",
			"refsource": "BID",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://support.apple.com/kb/HT5281",
			"name": "http://support.apple.com/kb/HT5281",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html",
			"name": "APPLE-SA-2012-05-09-1",
			"refsource": "APPLE",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html",
			"name": "APPLE-SA-2012-09-19-1",
			"refsource": "APPLE",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://support.apple.com/kb/HT5503",
			"name": "http://support.apple.com/kb/HT5503",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.debian.org/security/2012/dsa-2394",
			"name": "DSA-2394",
			"refsource": "DEBIAN",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2013-0217.html",
			"name": "RHSA-2013:0217",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html",
			"name": "SUSE-SU-2013:1627",
			"refsource": "SUSE",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://secunia.com/advisories/55568",
			"name": "55568",
			"refsource": "SECUNIA",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14504",
			"name": "oval:org.mitre.oval:def:14504",
			"refsource": "OVAL",
			"tags": [
				"Third Party Advisory"
			]
		}
	],
	"impact": {
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
				"accessVector": "NETWORK",
				"accessComplexity": "LOW",
				"authentication": "NONE",
				"confidentialityImpact": "PARTIAL",
				"integrityImpact": "PARTIAL",
				"availabilityImpact": "PARTIAL",
				"baseScore": 7.5
			},
			"severity": "HIGH",
			"exploitabilityScore": 10,
			"impactScore": 6.4,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-787"
}