libxml2
Page content
- Author: voroskoi
- Vulnerable: 2.6.30-1
- Unaffected: 2.6.30-2sayshell1
A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error within the “xmlCurrentChar()” function. This can be exploited to trigger the execution of an infinite loop via specially crafted UTF-8 sequences.
- Bug Tracker URL: http://bugs.frugalware.org/task/2700