exploit the possibilities

Debian Security Advisory 4265-1

Debian Security Advisory 4265-1
Posted Aug 6, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4265-1 - It was discovered that the Apache XML Security for C++ library performed insufficient validation of KeyInfo hints, which could result in denial of service via NULL pointer dereferences when processing malformed XML data.

tags | advisory, denial of service
systems | linux, debian
MD5 | 9a90cf56b98b557428b1e5bc125b86d7

Debian Security Advisory 4265-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4265-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 05, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : xml-security-c
CVE ID : not yet available

It was discovered that the Apache XML Security for C++ library performed
insufficient validation of KeyInfo hints, which could result in denial
of service via NULL pointer dereferences when processing malformed XML
data.

For the stable distribution (stretch), this problem has been fixed in
version 1.7.3-4+deb9u1.

We recommend that you upgrade your xml-security-c packages.

For the detailed security status of xml-security-c please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/xml-security-c

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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ItMu
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

January 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    15 Files
  • 2
    Jan 2nd
    15 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    1 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    24 Files
  • 8
    Jan 8th
    15 Files
  • 9
    Jan 9th
    16 Files
  • 10
    Jan 10th
    23 Files
  • 11
    Jan 11th
    17 Files
  • 12
    Jan 12th
    3 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    33 Files
  • 16
    Jan 16th
    23 Files
  • 17
    Jan 17th
    29 Files
  • 18
    Jan 18th
    15 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close