CVE-2007-6284
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://bugs.gentoo.org/show_bug.cgi?id=202628
CVE, Inc., Red Hat
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
CVE, Inc., Red Hat
http://lists.vmware.com/pipermail/security-announce/2008/000009.html
CVE, Inc., Red Hat
http://mail.gnome.org/archives/xml/2008-January/msg00036.html
CVE, Inc., Red Hat
http://secunia.com/advisories/28439
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28444
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28450
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28452
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28458
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28466
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28470
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28475
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28636
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28716
CVE, Inc., Red Hat
Vendor Advisory
http://secunia.com/advisories/28740
CVE, Inc., Red Hat
http://secunia.com/advisories/29591
CVE, Inc., Red Hat
http://secunia.com/advisories/31074
CVE, Inc., Red Hat
http://security.gentoo.org/glsa/glsa-200801-20.xml
CVE, Inc., Red Hat
http://securitytracker.com/id?1019181
CVE, Inc., Red Hat
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103201-1
CVE, Inc., Red Hat
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201514-1
CVE, Inc., Red Hat
http://support.avaya.com/elmodocs2/security/ASA-2008-047.htm
CVE, Inc., Red Hat
http://support.avaya.com/elmodocs2/security/ASA-2008-050.htm
CVE, Inc., Red Hat
http://www.debian.org/security/2008/dsa-1461
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDVSA-2008:010
CVE, Inc., Red Hat
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
CVE, Inc., Red Hat
http://www.redhat.com/support/errata/RHSA-2008-0032.html
CVE, Inc., Red Hat
Patch
http://www.securityfocus.com/archive/1/486410/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/490306/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/27248
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2008/0117
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2008/0144
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2008/1033/references
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2008/2094/references
CVE, Inc., Red Hat
http://www.xmlsoft.org/news.html
CVE, Inc., Red Hat
https://bugzilla.redhat.com/show_bug.cgi?id=425927
CVE, Inc., Red Hat
https://issues.rpath.com/browse/RPL-2121
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11594
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5216
CVE, Inc., Red Hat
https://usn.ubuntu.com/569-1/
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00379.html
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00396.html
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-399
Resource Management Errors
NIST  
Change History
8 change records found show changes
CVE Modified by CVE 11/20/2024 7:39:46 PM
Action
Type
Old Value
New Value
Added
Reference
http://bugs.gentoo.org/show_bug.cgi?id=202628
Added
Reference
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
Added
Reference
http://lists.vmware.com/pipermail/security-announce/2008/000009.html
Added
Reference
http://mail.gnome.org/archives/xml/2008-January/msg00036.html
Added
Reference
http://secunia.com/advisories/28439
Added
Reference
http://secunia.com/advisories/28444
Added
Reference
http://secunia.com/advisories/28450
Added
Reference
http://secunia.com/advisories/28452
Added
Reference
http://secunia.com/advisories/28458
Added
Reference
http://secunia.com/advisories/28466
Added
Reference
http://secunia.com/advisories/28470
Added
Reference
http://secunia.com/advisories/28475
Added
Reference
http://secunia.com/advisories/28636
Added
Reference
http://secunia.com/advisories/28716
Added
Reference
http://secunia.com/advisories/28740
Added
Reference
http://secunia.com/advisories/29591
Added
Reference
http://secunia.com/advisories/31074
Added
Reference
http://security.gentoo.org/glsa/glsa-200801-20.xml
Added
Reference
http://securitytracker.com/id?1019181
Added
Reference
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103201-1
Added
Reference
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201514-1
Added
Reference
http://support.avaya.com/elmodocs2/security/ASA-2008-047.htm
Added
Reference
http://support.avaya.com/elmodocs2/security/ASA-2008-050.htm
Added
Reference
http://www.debian.org/security/2008/dsa-1461
Added
Reference
http://www.mandriva.com/security/advisories?name=MDVSA-2008:010
Added
Reference
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
Added
Reference
http://www.redhat.com/support/errata/RHSA-2008-0032.html
Added
Reference
http://www.securityfocus.com/archive/1/486410/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/490306/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/27248
Added
Reference
http://www.vupen.com/english/advisories/2008/0117
Added
Reference
http://www.vupen.com/english/advisories/2008/0144
Added
Reference
http://www.vupen.com/english/advisories/2008/1033/references
Added
Reference
http://www.vupen.com/english/advisories/2008/2094/references
Added
Reference
http://www.xmlsoft.org/news.html
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=425927
Added
Reference
https://issues.rpath.com/browse/RPL-2121
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11594
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5216
Added
Reference
https://usn.ubuntu.com/569-1/
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00379.html
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00396.html
CVE Modified by Red Hat, Inc. 5/13/2024 9:49:26 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 2/12/2023 9:18:38 PM
Action
Type
Old Value
New Value
Changed
Description
CVE-2007-6284 libxml2: infinite loop in UTF-8 decoding
The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
Removed
Reference
https://access.redhat.com/errata/RHSA-2008:0032 [No Types Assigned]
Removed
Reference
https://access.redhat.com/security/cve/CVE-2007-6284 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/02/2023 9:15:13 AM
Action
Type
Old Value
New Value
Changed
Description
The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
CVE-2007-6284 libxml2: infinite loop in UTF-8 decoding
Added
Reference
https://access.redhat.com/errata/RHSA-2008:0032 [No Types Assigned]
Added
Reference
https://access.redhat.com/security/cve/CVE-2007-6284 [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/15/2018 5:51:29 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/486410/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/490306/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/486410/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/490306/100/0/threaded [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/03/2018 5:51:45 PM
Action
Type
Old Value
New Value
Added
Reference
https://usn.ubuntu.com/569-1/ [No Types Assigned]
Removed
Reference
http://www.ubuntulinux.org/support/documentation/usn/usn-569-1 [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/28/2017 9:29:52 PM
Action
Type
Old Value
New Value
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11594 [No Types Assigned]
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5216 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11594 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5216 [Tool Signature, US Government Resource]
Initial CVE Analysis 1/14/2008 9:49:00 AM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2007-6284 NVD
Published Date: 01/11/2008 NVD
Last Modified: 04/08/2025
Source: Red Hat, Inc.