Vulnerability Description
The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xml-Libxml Project | Xml-Libxml | <= 2.0118 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Fedoraproject | Fedora | 20 |
| Opensuse | Opensuse | 13.1 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2015-0199.htmlThird Party Advisory
- http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/ChangesRelease NotesThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157448.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157740.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00006.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3243Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:231Broken Link
- http://www.openwall.com/lists/oss-security/2015/04/25/2Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/04/30/1Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/74333Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2592-1Third Party Advisory
- https://bitbucket.org/shlomif/perl-xml-libxml/commits/5962fd067580767777e94640b1Vendor Advisory
- http://advisories.mageia.org/MGASA-2015-0199.htmlThird Party Advisory
- http://cpansearch.perl.org/src/SHLOMIF/XML-LibXML-2.0119/ChangesRelease NotesThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157448.htmlThird Party Advisory
FAQ
What is CVE-2015-3451?
CVE-2015-3451 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to th...
How severe is CVE-2015-3451?
CVE-2015-3451 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3451?
Check the references section above for vendor advisories and patch information. Affected products include: Xml-Libxml Project Xml-Libxml, Canonical Ubuntu Linux, Debian Debian Linux, Fedoraproject Fedora, Opensuse Opensuse.