cve-2012-6139
Vulnerability from cvelistv5
Published
2013-04-12 22:00
Modified
2024-08-06 21:28
Severity ?
Summary
libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html
secalert@redhat.comhttp://secunia.com/advisories/52745Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/52805Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/52813Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/52884Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2654
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:141
secalert@redhat.comhttp://www.securitytracker.com/id/1028338
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1784-1
secalert@redhat.comhttp://xmlsoft.org/XSLT/news.html
secalert@redhat.comhttps://bugzilla.gnome.org/show_bug.cgi?id=685328Exploit, Patch
secalert@redhat.comhttps://bugzilla.gnome.org/show_bug.cgi?id=685330Patch
secalert@redhat.comhttps://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833Patch
secalert@redhat.comhttps://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8dExploit, Patch
secalert@redhat.comhttps://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107
secalert@redhat.comhttps://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html
secalert@redhat.comhttps://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52745Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52805Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/52884Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2654
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:141
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1028338
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1784-1
af854a3a-2127-422b-91ae-364da2661108http://xmlsoft.org/XSLT/news.html
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.gnome.org/show_bug.cgi?id=685328Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.gnome.org/show_bug.cgi?id=685330Patch
af854a3a-2127-422b-91ae-364da2661108https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833Patch
af854a3a-2127-422b-91ae-364da2661108https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8dExploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107
af854a3a-2127-422b-91ae-364da2661108https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html
af854a3a-2127-422b-91ae-364da2661108https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T21:28:39.419Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "USN-1784-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-1784-1",
               },
               {
                  name: "52884",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/52884",
               },
               {
                  name: "52813",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/52813",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.gnome.org/show_bug.cgi?id=685330",
               },
               {
                  name: "SUSE-SU-2013:1654",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html",
               },
               {
                  name: "SUSE-SU-2013:1656",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d",
               },
               {
                  name: "openSUSE-SU-2013:0593",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html",
               },
               {
                  name: "openSUSE-SU-2013:0585",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html",
               },
               {
                  name: "MDVSA-2013:141",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:141",
               },
               {
                  name: "1028338",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1028338",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://xmlsoft.org/XSLT/news.html",
               },
               {
                  name: "52745",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/52745",
               },
               {
                  name: "FEDORA-2013-4507",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html",
               },
               {
                  name: "52805",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/52805",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.gnome.org/show_bug.cgi?id=685328",
               },
               {
                  name: "DSA-2654",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2013/dsa-2654",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-10-02T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2014-02-05T15:57:02",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "USN-1784-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-1784-1",
            },
            {
               name: "52884",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/52884",
            },
            {
               name: "52813",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/52813",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.gnome.org/show_bug.cgi?id=685330",
            },
            {
               name: "SUSE-SU-2013:1654",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html",
            },
            {
               name: "SUSE-SU-2013:1656",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d",
            },
            {
               name: "openSUSE-SU-2013:0593",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html",
            },
            {
               name: "openSUSE-SU-2013:0585",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html",
            },
            {
               name: "MDVSA-2013:141",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:141",
            },
            {
               name: "1028338",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1028338",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://xmlsoft.org/XSLT/news.html",
            },
            {
               name: "52745",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/52745",
            },
            {
               name: "FEDORA-2013-4507",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html",
            },
            {
               name: "52805",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/52805",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.gnome.org/show_bug.cgi?id=685328",
            },
            {
               name: "DSA-2654",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2013/dsa-2654",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2012-6139",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "USN-1784-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-1784-1",
                  },
                  {
                     name: "52884",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/52884",
                  },
                  {
                     name: "52813",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/52813",
                  },
                  {
                     name: "https://bugzilla.gnome.org/show_bug.cgi?id=685330",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.gnome.org/show_bug.cgi?id=685330",
                  },
                  {
                     name: "SUSE-SU-2013:1654",
                     refsource: "SUSE",
                     url: "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html",
                  },
                  {
                     name: "SUSE-SU-2013:1656",
                     refsource: "SUSE",
                     url: "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html",
                  },
                  {
                     name: "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d",
                     refsource: "CONFIRM",
                     url: "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d",
                  },
                  {
                     name: "openSUSE-SU-2013:0593",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html",
                  },
                  {
                     name: "openSUSE-SU-2013:0585",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html",
                  },
                  {
                     name: "MDVSA-2013:141",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:141",
                  },
                  {
                     name: "1028338",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1028338",
                  },
                  {
                     name: "http://xmlsoft.org/XSLT/news.html",
                     refsource: "CONFIRM",
                     url: "http://xmlsoft.org/XSLT/news.html",
                  },
                  {
                     name: "52745",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/52745",
                  },
                  {
                     name: "FEDORA-2013-4507",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html",
                  },
                  {
                     name: "52805",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/52805",
                  },
                  {
                     name: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107",
                     refsource: "CONFIRM",
                     url: "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107",
                  },
                  {
                     name: "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833",
                     refsource: "CONFIRM",
                     url: "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833",
                  },
                  {
                     name: "https://bugzilla.gnome.org/show_bug.cgi?id=685328",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.gnome.org/show_bug.cgi?id=685328",
                  },
                  {
                     name: "DSA-2654",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2013/dsa-2654",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2012-6139",
      datePublished: "2013-04-12T22:00:00",
      dateReserved: "2012-12-06T00:00:00",
      dateUpdated: "2024-08-06T21:28:39.419Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.1.27\", \"matchCriteriaId\": \"A45AC51B-B71D-4F32-845F-8CADEDF658CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E595672-2421-461D-87D9-328048B25050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"956B09D6-C565-400E-A138-ED4A2BBC275E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD95682-DC9E-4F6F-AFAF-A76A5798CD6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28E01474-EC8B-4664-8207-EC46C0175554\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5175CD5-1CA4-49A8-8CCD-586EFCD25D8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0AB058A-BAF1-4F86-9F79-8C5A9A01DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1975FB9-2D07-418B-BB0B-782D068C0535\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D10EDFCC-7A5B-4AE4-A213-494711975D8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF2B4C26-6197-4C37-AABB-934EF4E37943\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFA1BBF-D793-4E1C-82A5-4688675B542F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D71D19E-2679-42A1-81E4-CE1DE422CE7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7AD4CCA-3D5F-410F-A4C0-8722CE656E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C0DDE39-304C-4F1B-B840-1CF3C970D3BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.13.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FE5C85D-4044-413B-863A-25972FC6F669\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:0.14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C4F412D-4DC9-4F36-9035-78F5977D0FCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99186C70-8E36-45F9-8E42-4A08D2FDEF2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03E48915-76B4-4788-B4AA-6B3B7746E397\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC5C699-6CDB-4C2C-8BD7-1F68AB0C5348\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E3DB742-5752-408A-AD89-55032A2389B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A57E80C-5D45-4574-9944-AC0DA3620118\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CB7BA1B-9548-4D1C-8A10-34239120B0BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86D10EDB-D8DF-4CA3-8799-D2646DEC802B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B4EA931-6846-488F-AD33-FE9D04EF07A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D67FD41-2404-4658-8D6B-4DBD4F471880\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A6F6DF1-2375-4389-B07D-FF486C3502CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0469B71F-2303-4072-9C54-2004A117E4C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BDFD037-100A-4F3E-B114-E3F72BA17084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2EDDE79-10ED-4465-ADEA-C989548BA314\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C61F9034-C7F6-4430-A2AA-4A0C00A9747B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68926A2D-5311-46CF-AF16-AC16F53CDE45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3CBA3E7-0BD1-41B2-BC17-D26BA825B983\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E63AAA8C-84CB-40D9-85D3-B8E62B6304CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C19E3F3-2B60-4356-B32A-64F39340FB68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34C904FE-A924-47B3-87DA-4F5A0BF1A398\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEE3321C-0865-4734-BB89-C3C4AAABBA61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"684B2370-5265-4E85-BAE0-A987FA14F6DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46F05C32-8B19-4B6A-A02F-D5F96489979E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A83D4930-CA0C-4BE0-BA05-A041F80AA6A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F824E314-F658-463F-9A33-AA577EF8D4E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0556BEA-0B5E-4EF7-9E7E-EF0A4323BFDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C09DB64-1D4B-4047-B76A-D249B8D0F55F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"270B7D3F-2541-4E7C-B40C-2014BD3CA4DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29159B77-EB1C-4DA3-9DD5-52113C353870\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D2878F7-0917-4A17-9CB3-3B644A9B8A26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E43B3CAF-65FA-417C-A8E5-04806C4C3709\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26F9E2A6-19FC-41D4-9EB7-4FFCB152CDFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8699DD77-22BD-4E8F-8210-956E7DCD805D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF265313-EB0B-4649-A432-E95DE0AEE4EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.0.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"555054F5-4C4C-4BD0-ADD9-2E8C55814D9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14054A80-5975-48DA-A2B8-800ED3F17F6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E39216FB-6A55-4C15-AEBA-AC68CFE8D184\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8F9F47F-76D2-44F7-93DE-045E5F05DF57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBF5779A-EE67-4AA2-86EE-5F4534AF8EFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04167292-B8A5-4CE2-AE7B-70FD2BDE5724\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A663FD5-6694-4203-A0B8-405121A6B346\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1614DAE5-A84E-4898-B9E0-E4F5DD5D17AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"493B79B8-74A0-4089-BBA5-435C3B549928\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFCEA36-7573-491B-8438-4E3FDF8E97ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF38997D-634C-423C-BD82-44E74A99D8DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D4401FF-84D8-4AD5-BAED-978E31E5DADB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC004874-3C5D-4932-AD5B-BE7156D7D13E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"269892E0-1ABA-4D0F-8266-A4DA8A575967\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4597D362-AD62-4D58-BC7F-CCED44488466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D885D06-D6E5-432C-9923-AE2CE73F7654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F5003EF-82E2-49F9-9F74-CB92FE98E2E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C0D6095-2A7B-4328-ADA0-283E8F79AFDD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91C70E5E-A987-4BF3-9300-E4A3F2B0B853\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5EFA6E9-593B-484A-A8FB-A22BAEE208B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58E904DA-889E-44B9-9AF6-EC753FB316BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"69A51C1E-21C9-4FA4-8340-345B5E1F1B70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9D7C38F-EF88-4531-803D-BA911978A176\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCE8B7B5-4C35-4F65-B891-80A207BA83D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xmlsoft:libxslt:1.1.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"147804D0-9C1A-4BD8-A800-0F2B7EA40FEA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE554781-1EB9-446E-911F-6C11970C47F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D806A17E-B8F9-466D-807D-3F1E77603DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.\"}, {\"lang\": \"es\", \"value\": \"libxslt antes de v1.1.28 permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (desreferencia a puntero NULL y ca\\u00edda del sistema) mediante un atributo (1) match  vac\\u00edo en una clave XSL a la funci\\u00f3n xsltAddKey en keys.c o (2) una variable no inicializada en la funci\\u00f3n xsltDocumentFunction en functions.c.\"}]",
         evaluatorComment: "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'CWE-476: NULL Pointer Dereference'",
         id: "CVE-2012-6139",
         lastModified: "2024-11-21T01:45:53.987",
         metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
         published: "2013-04-12T22:55:01.007",
         references: "[{\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/52745\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52805\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52813\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52884\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2013/dsa-2654\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2013:141\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id/1028338\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1784-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://xmlsoft.org/XSLT/news.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.gnome.org/show_bug.cgi?id=685328\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://bugzilla.gnome.org/show_bug.cgi?id=685330\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/52745\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52805\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52813\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52884\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.debian.org/security/2013/dsa-2654\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2013:141\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1028338\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1784-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://xmlsoft.org/XSLT/news.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.gnome.org/show_bug.cgi?id=685328\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://bugzilla.gnome.org/show_bug.cgi?id=685330\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
         sourceIdentifier: "secalert@redhat.com",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2012-6139\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-04-12T22:55:01.007\",\"lastModified\":\"2024-11-21T01:45:53.987\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.\"},{\"lang\":\"es\",\"value\":\"libxslt antes de v1.1.28 permite a atacantes remotos provocar una denegación de servicio (desreferencia a puntero NULL y caída del sistema) mediante un atributo (1) match  vacío en una clave XSL a la función xsltAddKey en keys.c o (2) una variable no inicializada en la función xsltDocumentFunction en functions.c.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.27\",\"matchCriteriaId\":\"A45AC51B-B71D-4F32-845F-8CADEDF658CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E595672-2421-461D-87D9-328048B25050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956B09D6-C565-400E-A138-ED4A2BBC275E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD95682-DC9E-4F6F-AFAF-A76A5798CD6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E01474-EC8B-4664-8207-EC46C0175554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5175CD5-1CA4-49A8-8CCD-586EFCD25D8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0AB058A-BAF1-4F86-9F79-8C5A9A01DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1975FB9-2D07-418B-BB0B-782D068C0535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EDFCC-7A5B-4AE4-A213-494711975D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF2B4C26-6197-4C37-AABB-934EF4E37943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFA1BBF-D793-4E1C-82A5-4688675B542F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D71D19E-2679-42A1-81E4-CE1DE422CE7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7AD4CCA-3D5F-410F-A4C0-8722CE656E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0DDE39-304C-4F1B-B840-1CF3C970D3BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE5C85D-4044-413B-863A-25972FC6F669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4F412D-4DC9-4F36-9035-78F5977D0FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99186C70-8E36-45F9-8E42-4A08D2FDEF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E48915-76B4-4788-B4AA-6B3B7746E397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC5C699-6CDB-4C2C-8BD7-1F68AB0C5348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3DB742-5752-408A-AD89-55032A2389B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A57E80C-5D45-4574-9944-AC0DA3620118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CB7BA1B-9548-4D1C-8A10-34239120B0BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D10EDB-D8DF-4CA3-8799-D2646DEC802B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4EA931-6846-488F-AD33-FE9D04EF07A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D67FD41-2404-4658-8D6B-4DBD4F471880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6F6DF1-2375-4389-B07D-FF486C3502CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0469B71F-2303-4072-9C54-2004A117E4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDFD037-100A-4F3E-B114-E3F72BA17084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EDDE79-10ED-4465-ADEA-C989548BA314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61F9034-C7F6-4430-A2AA-4A0C00A9747B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68926A2D-5311-46CF-AF16-AC16F53CDE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CBA3E7-0BD1-41B2-BC17-D26BA825B983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63AAA8C-84CB-40D9-85D3-B8E62B6304CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C19E3F3-2B60-4356-B32A-64F39340FB68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34C904FE-A924-47B3-87DA-4F5A0BF1A398\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE3321C-0865-4734-BB89-C3C4AAABBA61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684B2370-5265-4E85-BAE0-A987FA14F6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F05C32-8B19-4B6A-A02F-D5F96489979E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83D4930-CA0C-4BE0-BA05-A041F80AA6A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F824E314-F658-463F-9A33-AA577EF8D4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0556BEA-0B5E-4EF7-9E7E-EF0A4323BFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C09DB64-1D4B-4047-B76A-D249B8D0F55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"270B7D3F-2541-4E7C-B40C-2014BD3CA4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29159B77-EB1C-4DA3-9DD5-52113C353870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2878F7-0917-4A17-9CB3-3B644A9B8A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43B3CAF-65FA-417C-A8E5-04806C4C3709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F9E2A6-19FC-41D4-9EB7-4FFCB152CDFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8699DD77-22BD-4E8F-8210-956E7DCD805D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF265313-EB0B-4649-A432-E95DE0AEE4EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"555054F5-4C4C-4BD0-ADD9-2E8C55814D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14054A80-5975-48DA-A2B8-800ED3F17F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39216FB-6A55-4C15-AEBA-AC68CFE8D184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F9F47F-76D2-44F7-93DE-045E5F05DF57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF5779A-EE67-4AA2-86EE-5F4534AF8EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04167292-B8A5-4CE2-AE7B-70FD2BDE5724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A663FD5-6694-4203-A0B8-405121A6B346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614DAE5-A84E-4898-B9E0-E4F5DD5D17AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493B79B8-74A0-4089-BBA5-435C3B549928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFCEA36-7573-491B-8438-4E3FDF8E97ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF38997D-634C-423C-BD82-44E74A99D8DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4401FF-84D8-4AD5-BAED-978E31E5DADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC004874-3C5D-4932-AD5B-BE7156D7D13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"269892E0-1ABA-4D0F-8266-A4DA8A575967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4597D362-AD62-4D58-BC7F-CCED44488466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D885D06-D6E5-432C-9923-AE2CE73F7654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5003EF-82E2-49F9-9F74-CB92FE98E2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0D6095-2A7B-4328-ADA0-283E8F79AFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C70E5E-A987-4BF3-9300-E4A3F2B0B853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EFA6E9-593B-484A-A8FB-A22BAEE208B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E904DA-889E-44B9-9AF6-EC753FB316BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A51C1E-21C9-4FA4-8340-345B5E1F1B70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D7C38F-EF88-4531-803D-BA911978A176\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCE8B7B5-4C35-4F65-B891-80A207BA83D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"147804D0-9C1A-4BD8-A800-0F2B7EA40FEA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB2C482-D2A4-48B3-ACE7-E1DFDCC409B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/52745\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52805\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52813\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52884\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2013/dsa-2654\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:141\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1028338\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1784-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://xmlsoft.org/XSLT/news.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.gnome.org/show_bug.cgi?id=685328\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://bugzilla.gnome.org/show_bug.cgi?id=685330\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/52745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2013/dsa-2654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1028338\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1784-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://xmlsoft.org/XSLT/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.gnome.org/show_bug.cgi?id=685328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://bugzilla.gnome.org/show_bug.cgi?id=685330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"Per: http://cwe.mitre.org/data/definitions/476.html\\r\\n\\r\\n'CWE-476: NULL Pointer Dereference'\"}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.