CVE-2013-0339

N/A Unknown
Published: January 21, 2014 Modified: April 29, 2026
View on NVD

Description

libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because libxml2 already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed and each affected application would need its own CVE.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://seclists.org/oss-sec/2013/q4/182
Source: secalert@redhat.com
http://seclists.org/oss-sec/2013/q4/184
Source: secalert@redhat.com
http://seclists.org/oss-sec/2013/q4/188
Source: secalert@redhat.com
http://secunia.com/advisories/52662
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/54172
Source: secalert@redhat.com
http://secunia.com/advisories/55568
Source: secalert@redhat.com
Vendor Advisory
http://www.ubuntu.com/usn/USN-1904-1
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-1904-2
Source: secalert@redhat.com
http://openwall.com/lists/oss-security/2013/02/21/24
Source: af854a3a-2127-422b-91ae-364da2661108
http://openwall.com/lists/oss-security/2013/02/22/3
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/oss-sec/2013/q4/182
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/oss-sec/2013/q4/184
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/oss-sec/2013/q4/188
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/52662
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/54172
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/55568
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2013/dsa-2652
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2013/04/12/6
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-1904-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-1904-2
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=915149
Source: af854a3a-2127-422b-91ae-364da2661108

30 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.8%
83th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian xmlsoft canonical suse