CVE Vulnerabilities

CVE-2009-2416

Use After Free

Published: Aug 11, 2009 | Modified: Jan 21, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM

Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Libxml Xmlsoft 1.8.17 (including) 1.8.17 (including)
Libxml2 Xmlsoft 2.5.10 (including) 2.5.10 (including)
Libxml2 Xmlsoft 2.6.16 (including) 2.6.16 (including)
Libxml2 Xmlsoft 2.6.26 (including) 2.6.26 (including)
Libxml2 Xmlsoft 2.6.27 (including) 2.6.27 (including)
Libxml2 Xmlsoft 2.6.32 (including) 2.6.32 (including)
Red Hat Enterprise Linux 3 RedHat libxml-1:1.8.17-9.3 *
Red Hat Enterprise Linux 3 RedHat libxml2-0:2.5.10-15 *
Red Hat Enterprise Linux 4 RedHat libxml2-0:2.6.16-12.7 *
Red Hat Enterprise Linux 5 RedHat libxml2-0:2.6.26-2.1.2.8 *
Libxml Ubuntu dapper *
Libxml Ubuntu hardy *
Libxml2 Ubuntu dapper *
Libxml2 Ubuntu hardy *
Libxml2 Ubuntu intrepid *
Libxml2 Ubuntu jaunty *
Libxml2 Ubuntu upstream *

Potential Mitigations

References