cvelist/2012/6xxx/CVE-2012-6139.json

153 lines
5.0 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2012-6139",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "http://xmlsoft.org/XSLT/news.html",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://xmlsoft.org/XSLT/news.html"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=685328",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=685328"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=685330",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=685330"
},
{
"name" : "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://git.gnome.org/browse/libxslt/commit/?id=6c99c519d97e5fcbec7a9537d190efb442e4e833"
},
{
"name" : "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://git.gnome.org/browse/libxslt/commit/?id=dc11b6b379a882418093ecc8adf11f6166682e8d"
},
{
"name" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107"
},
{
"name" : "DSA-2654",
"refsource" : "DEBIAN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2013/dsa-2654"
},
{
"name" : "FEDORA-2013-4507",
"refsource" : "FEDORA",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102065.html"
},
{
"name" : "MDVSA-2013:141",
"refsource" : "MANDRIVA",
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:141"
},
{
"name" : "openSUSE-SU-2013:0585",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-updates/2013-04/msg00020.html"
},
{
"name" : "openSUSE-SU-2013:0593",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.opensuse.org/opensuse-updates/2013-04/msg00028.html"
},
{
"name" : "SUSE-SU-2013:1654",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html"
},
{
"name" : "SUSE-SU-2013:1656",
"refsource" : "SUSE",
2017-10-16 12:31:07 -04:00
"url" : "https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html"
},
{
"name" : "USN-1784-1",
"refsource" : "UBUNTU",
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/USN-1784-1"
},
{
"name" : "1028338",
"refsource" : "SECTRACK",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securitytracker.com/id/1028338"
},
{
"name" : "52745",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/52745"
},
{
"name" : "52805",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/52805"
},
{
"name" : "52813",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/52813"
},
{
"name" : "52884",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/52884"
}
]
}
}