cve-2013-4520
Vulnerability from cvelistv5
Published
2013-12-14 20:00
Modified
2024-08-06 16:45
Severity ?
Summary
xslt.c in libxslt before 1.1.25 allows context-dependent attackers to cause a denial of service (crash) via a stylesheet that embeds a DTD, which causes a structure to be accessed as a different type. NOTE: this issue is due to an incomplete fix for CVE-2012-2825.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.708Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20131105 Re: CVE Request: additional fix for CVE-2012-2825 libxslt crash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/239"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitorious.org/libxslt/libxslt/commit/7089a62b8f133b42a2981cf1f920a8b3fe9a8caa"
          },
          {
            "name": "SUSE-SU-2013:1654",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
          },
          {
            "name": "SUSE-SU-2013:1656",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html"
          },
          {
            "name": "56072",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56072"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=849019"
          },
          {
            "name": "99671",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/99671"
          },
          {
            "name": "[oss-security] 20131105 CVE Request: additional fix for CVE-2012-2825 libxslt crash",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/238"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "xslt.c in libxslt before 1.1.25 allows context-dependent attackers to cause a denial of service (crash) via a stylesheet that embeds a DTD, which causes a structure to be accessed as a different type.  NOTE: this issue is due to an incomplete fix for CVE-2012-2825."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-14T19:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20131105 Re: CVE Request: additional fix for CVE-2012-2825 libxslt crash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/239"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitorious.org/libxslt/libxslt/commit/7089a62b8f133b42a2981cf1f920a8b3fe9a8caa"
        },
        {
          "name": "SUSE-SU-2013:1654",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
        },
        {
          "name": "SUSE-SU-2013:1656",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html"
        },
        {
          "name": "56072",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56072"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=849019"
        },
        {
          "name": "99671",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/99671"
        },
        {
          "name": "[oss-security] 20131105 CVE Request: additional fix for CVE-2012-2825 libxslt crash",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/238"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-4520",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "xslt.c in libxslt before 1.1.25 allows context-dependent attackers to cause a denial of service (crash) via a stylesheet that embeds a DTD, which causes a structure to be accessed as a different type.  NOTE: this issue is due to an incomplete fix for CVE-2012-2825."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20131105 Re: CVE Request: additional fix for CVE-2012-2825 libxslt crash",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/239"
            },
            {
              "name": "https://gitorious.org/libxslt/libxslt/commit/7089a62b8f133b42a2981cf1f920a8b3fe9a8caa",
              "refsource": "MISC",
              "url": "https://gitorious.org/libxslt/libxslt/commit/7089a62b8f133b42a2981cf1f920a8b3fe9a8caa"
            },
            {
              "name": "SUSE-SU-2013:1654",
              "refsource": "SUSE",
              "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
            },
            {
              "name": "SUSE-SU-2013:1656",
              "refsource": "SUSE",
              "url": "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html"
            },
            {
              "name": "56072",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56072"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=849019",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=849019"
            },
            {
              "name": "99671",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/99671"
            },
            {
              "name": "[oss-security] 20131105 CVE Request: additional fix for CVE-2012-2825 libxslt crash",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2013/q4/238"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4520",
    "datePublished": "2013-12-14T20:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.708Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-4520\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-12-14T20:55:03.407\",\"lastModified\":\"2013-12-16T23:05:03.467\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"xslt.c in libxslt before 1.1.25 allows context-dependent attackers to cause a denial of service (crash) via a stylesheet that embeds a DTD, which causes a structure to be accessed as a different type.  NOTE: this issue is due to an incomplete fix for CVE-2012-2825.\"},{\"lang\":\"es\",\"value\":\"xslt.c en libxslt anterior a 1.1.25 permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una hoja de estilo embebida en una DTD, lo que hace que una estructura sea accesible como un tipo diferente. NOTA: este problema se debe a una soluci\u00f3n incompleta de CVE-2012-2825.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.24\",\"matchCriteriaId\":\"0CB5BF4A-58DB-4329-A89A-B11F4663B059\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E595672-2421-461D-87D9-328048B25050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956B09D6-C565-400E-A138-ED4A2BBC275E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD95682-DC9E-4F6F-AFAF-A76A5798CD6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E01474-EC8B-4664-8207-EC46C0175554\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5175CD5-1CA4-49A8-8CCD-586EFCD25D8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0AB058A-BAF1-4F86-9F79-8C5A9A01DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1975FB9-2D07-418B-BB0B-782D068C0535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D10EDFCC-7A5B-4AE4-A213-494711975D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF2B4C26-6197-4C37-AABB-934EF4E37943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFA1BBF-D793-4E1C-82A5-4688675B542F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D71D19E-2679-42A1-81E4-CE1DE422CE7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7AD4CCA-3D5F-410F-A4C0-8722CE656E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C0DDE39-304C-4F1B-B840-1CF3C970D3BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE5C85D-4044-413B-863A-25972FC6F669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:0.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4F412D-4DC9-4F36-9035-78F5977D0FCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99186C70-8E36-45F9-8E42-4A08D2FDEF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03E48915-76B4-4788-B4AA-6B3B7746E397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC5C699-6CDB-4C2C-8BD7-1F68AB0C5348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3DB742-5752-408A-AD89-55032A2389B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A57E80C-5D45-4574-9944-AC0DA3620118\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CB7BA1B-9548-4D1C-8A10-34239120B0BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86D10EDB-D8DF-4CA3-8799-D2646DEC802B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4EA931-6846-488F-AD33-FE9D04EF07A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D67FD41-2404-4658-8D6B-4DBD4F471880\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6F6DF1-2375-4389-B07D-FF486C3502CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0469B71F-2303-4072-9C54-2004A117E4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDFD037-100A-4F3E-B114-E3F72BA17084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2EDDE79-10ED-4465-ADEA-C989548BA314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61F9034-C7F6-4430-A2AA-4A0C00A9747B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68926A2D-5311-46CF-AF16-AC16F53CDE45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CBA3E7-0BD1-41B2-BC17-D26BA825B983\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63AAA8C-84CB-40D9-85D3-B8E62B6304CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C19E3F3-2B60-4356-B32A-64F39340FB68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34C904FE-A924-47B3-87DA-4F5A0BF1A398\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE3321C-0865-4734-BB89-C3C4AAABBA61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"684B2370-5265-4E85-BAE0-A987FA14F6DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F05C32-8B19-4B6A-A02F-D5F96489979E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83D4930-CA0C-4BE0-BA05-A041F80AA6A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F824E314-F658-463F-9A33-AA577EF8D4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0556BEA-0B5E-4EF7-9E7E-EF0A4323BFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C09DB64-1D4B-4047-B76A-D249B8D0F55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"270B7D3F-2541-4E7C-B40C-2014BD3CA4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29159B77-EB1C-4DA3-9DD5-52113C353870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2878F7-0917-4A17-9CB3-3B644A9B8A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43B3CAF-65FA-417C-A8E5-04806C4C3709\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F9E2A6-19FC-41D4-9EB7-4FFCB152CDFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8699DD77-22BD-4E8F-8210-956E7DCD805D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF265313-EB0B-4649-A432-E95DE0AEE4EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"555054F5-4C4C-4BD0-ADD9-2E8C55814D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14054A80-5975-48DA-A2B8-800ED3F17F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39216FB-6A55-4C15-AEBA-AC68CFE8D184\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F9F47F-76D2-44F7-93DE-045E5F05DF57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF5779A-EE67-4AA2-86EE-5F4534AF8EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04167292-B8A5-4CE2-AE7B-70FD2BDE5724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A663FD5-6694-4203-A0B8-405121A6B346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1614DAE5-A84E-4898-B9E0-E4F5DD5D17AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493B79B8-74A0-4089-BBA5-435C3B549928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFCEA36-7573-491B-8438-4E3FDF8E97ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF38997D-634C-423C-BD82-44E74A99D8DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D4401FF-84D8-4AD5-BAED-978E31E5DADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC004874-3C5D-4932-AD5B-BE7156D7D13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"269892E0-1ABA-4D0F-8266-A4DA8A575967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4597D362-AD62-4D58-BC7F-CCED44488466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D885D06-D6E5-432C-9923-AE2CE73F7654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5003EF-82E2-49F9-9F74-CB92FE98E2E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0D6095-2A7B-4328-ADA0-283E8F79AFDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C70E5E-A987-4BF3-9300-E4A3F2B0B853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EFA6E9-593B-484A-A8FB-A22BAEE208B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58E904DA-889E-44B9-9AF6-EC753FB316BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A51C1E-21C9-4FA4-8340-345B5E1F1B70\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/oss-sec/2013/q4/238\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://seclists.org/oss-sec/2013/q4/239\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/56072\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/99671\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=849019\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://gitorious.org/libxslt/libxslt/commit/7089a62b8f133b42a2981cf1f920a8b3fe9a8caa\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html\",\"source\":\"secalert@redhat.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.