{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2012-3489", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://www.postgresql.org/about/news/1407/", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/about/news/1407/" }, { "name" : "http://www.postgresql.org/docs/8.3/static/release-8-3-20.html", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/docs/8.3/static/release-8-3-20.html" }, { "name" : "http://www.postgresql.org/docs/8.4/static/release-8-4-13.html", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/docs/8.4/static/release-8-4-13.html" }, { "name" : "http://www.postgresql.org/docs/9.0/static/release-9-0-9.html", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/docs/9.0/static/release-9-0-9.html" }, { "name" : "http://www.postgresql.org/docs/9.1/static/release-9-1-5.html", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/docs/9.1/static/release-9-1-5.html" }, { "name" : "http://www.postgresql.org/support/security/", "refsource" : "CONFIRM", "url" : "http://www.postgresql.org/support/security/" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=849173", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=849173" }, { "name" : "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2", "refsource" : "CONFIRM", "url" : "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_postgresql2" }, { "name" : "APPLE-SA-2013-03-14-1", "refsource" : "APPLE", "url" : "http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html" }, { "name" : "DSA-2534", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2012/dsa-2534" }, { "name" : "MDVSA-2012:139", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:139" }, { "name" : "RHSA-2012:1263", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2012-1263.html" }, { "name" : "openSUSE-SU-2012:1299", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" }, { "name" : "openSUSE-SU-2012:1251", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" }, { "name" : "openSUSE-SU-2012:1288", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" }, { "name" : "USN-1542-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/USN-1542-1" }, { "name" : "55074", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/55074" }, { "name" : "50635", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/50635" }, { "name" : "50718", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/50718" }, { "name" : "50946", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/50946" }, { "name" : "50859", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/50859" } ] } }