CVE-2015-3451

NameCVE-2015-3451
DescriptionThe _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-214-1, DSA-3243-1
NVD severitymedium (attack range: remote)
Debian Bugs783443

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml-libxml-perl (PTS)wheezy, wheezy (security)2.0001+dfsg-1+deb7u1fixed
jessie (security), jessie2.0116+dfsg-1+deb8u1fixed
stretch2.0128+dfsg-1fixed
buster, sid2.0128+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml-libxml-perlsource(unstable)2.0116+dfsg-2medium783443
libxml-libxml-perlsourcejessie2.0116+dfsg-1+deb8u1mediumDSA-3243-1
libxml-libxml-perlsourcesqueeze1.70.ds-1+deb6u1mediumDLA-214-1
libxml-libxml-perlsourcewheezy2.0001+dfsg-1+deb7u1mediumDSA-3243-1

Notes

http://www.openwall.com/lists/oss-security/2015/04/25/2
https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b129ae8930a68a30
https://bitbucket.org/shlomif/perl-xml-libxml/commits/915f1dbaf21c5f3c21d7c519c70fd93859e47152

Search for package or bug name: Reporting problems