fkie_cve-2012-0841
Vulnerability from fkie_nvd
Published
2012-12-21 05:46
Modified
2025-04-11 00:51
Severity ?
Summary
libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846
secalert@redhat.comhttp://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-0324.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-0217.html
secalert@redhat.comhttp://secunia.com/advisories/54886
secalert@redhat.comhttp://secunia.com/advisories/55568
secalert@redhat.comhttp://securitytracker.com/id?1026723
secalert@redhat.comhttp://support.apple.com/kb/HT5934
secalert@redhat.comhttp://support.apple.com/kb/HT6001
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2417
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:150
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/02/22/1
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
secalert@redhat.comhttp://www.securityfocus.com/bid/52107Patch
secalert@redhat.comhttp://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
secalert@redhat.comhttp://xmlsoft.org/news.html
secalert@redhat.comhttps://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-0324.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-0217.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54886
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55568
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1026723
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5934
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT6001
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2417
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/02/22/1
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/52107Patch
af854a3a-2127-422b-91ae-364da2661108http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
af854a3a-2127-422b-91ae-364da2661108http://xmlsoft.org/news.html
af854a3a-2127-422b-91ae-364da2661108https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of
Impacted products
Vendor Product Version
xmlsoft libxml2 *
xmlsoft libxml2 1.7.0
xmlsoft libxml2 1.7.1
xmlsoft libxml2 1.7.2
xmlsoft libxml2 1.7.3
xmlsoft libxml2 1.7.4
xmlsoft libxml2 1.8.0
xmlsoft libxml2 1.8.1
xmlsoft libxml2 1.8.2
xmlsoft libxml2 1.8.3
xmlsoft libxml2 1.8.4
xmlsoft libxml2 1.8.5
xmlsoft libxml2 1.8.6
xmlsoft libxml2 1.8.7
xmlsoft libxml2 1.8.9
xmlsoft libxml2 1.8.10
xmlsoft libxml2 1.8.13
xmlsoft libxml2 1.8.14
xmlsoft libxml2 1.8.16
xmlsoft libxml2 2.0.0
xmlsoft libxml2 2.1.0
xmlsoft libxml2 2.1.1
xmlsoft libxml2 2.2.0
xmlsoft libxml2 2.2.0
xmlsoft libxml2 2.2.1
xmlsoft libxml2 2.2.2
xmlsoft libxml2 2.2.3
xmlsoft libxml2 2.2.4
xmlsoft libxml2 2.2.5
xmlsoft libxml2 2.2.6
xmlsoft libxml2 2.2.7
xmlsoft libxml2 2.2.8
xmlsoft libxml2 2.2.9
xmlsoft libxml2 2.2.10
xmlsoft libxml2 2.2.11
xmlsoft libxml2 2.3.0
xmlsoft libxml2 2.3.1
xmlsoft libxml2 2.3.2
xmlsoft libxml2 2.3.3
xmlsoft libxml2 2.3.4
xmlsoft libxml2 2.3.5
xmlsoft libxml2 2.3.6
xmlsoft libxml2 2.3.7
xmlsoft libxml2 2.3.8
xmlsoft libxml2 2.3.9
xmlsoft libxml2 2.3.10
xmlsoft libxml2 2.3.11
xmlsoft libxml2 2.3.12
xmlsoft libxml2 2.3.13
xmlsoft libxml2 2.3.14
xmlsoft libxml2 2.4.1
xmlsoft libxml2 2.4.2
xmlsoft libxml2 2.4.3
xmlsoft libxml2 2.4.4
xmlsoft libxml2 2.4.5
xmlsoft libxml2 2.4.6
xmlsoft libxml2 2.4.7
xmlsoft libxml2 2.4.8
xmlsoft libxml2 2.4.9
xmlsoft libxml2 2.4.10
xmlsoft libxml2 2.4.11
xmlsoft libxml2 2.4.12
xmlsoft libxml2 2.4.13
xmlsoft libxml2 2.4.14
xmlsoft libxml2 2.4.15
xmlsoft libxml2 2.4.16
xmlsoft libxml2 2.4.17
xmlsoft libxml2 2.4.18
xmlsoft libxml2 2.4.19
xmlsoft libxml2 2.4.20
xmlsoft libxml2 2.4.21
xmlsoft libxml2 2.4.22
xmlsoft libxml2 2.4.23
xmlsoft libxml2 2.4.24
xmlsoft libxml2 2.4.25
xmlsoft libxml2 2.4.26
xmlsoft libxml2 2.4.27
xmlsoft libxml2 2.4.28
xmlsoft libxml2 2.4.29
xmlsoft libxml2 2.4.30
xmlsoft libxml2 2.5.0
xmlsoft libxml2 2.5.4
xmlsoft libxml2 2.5.7
xmlsoft libxml2 2.5.8
xmlsoft libxml2 2.5.10
xmlsoft libxml2 2.5.11
xmlsoft libxml2 2.6.0
xmlsoft libxml2 2.6.1
xmlsoft libxml2 2.6.2
xmlsoft libxml2 2.6.3
xmlsoft libxml2 2.6.4
xmlsoft libxml2 2.6.5
xmlsoft libxml2 2.6.6
xmlsoft libxml2 2.6.7
xmlsoft libxml2 2.6.8
xmlsoft libxml2 2.6.9
xmlsoft libxml2 2.6.11
xmlsoft libxml2 2.6.12
xmlsoft libxml2 2.6.13
xmlsoft libxml2 2.6.14
xmlsoft libxml2 2.6.16
xmlsoft libxml2 2.6.17
xmlsoft libxml2 2.6.18
xmlsoft libxml2 2.6.20
xmlsoft libxml2 2.6.21
xmlsoft libxml2 2.6.22
xmlsoft libxml2 2.6.23
xmlsoft libxml2 2.6.24
xmlsoft libxml2 2.6.25
xmlsoft libxml2 2.6.26
xmlsoft libxml2 2.6.27
xmlsoft libxml2 2.6.28
xmlsoft libxml2 2.6.29
xmlsoft libxml2 2.6.30
xmlsoft libxml2 2.6.31
xmlsoft libxml2 2.6.32
xmlsoft libxml2 2.7.0
xmlsoft libxml2 2.7.1
xmlsoft libxml2 2.7.2
xmlsoft libxml2 2.7.3
xmlsoft libxml2 2.7.4
xmlsoft libxml2 2.7.5
xmlsoft libxml2 2.7.6
xmlsoft libxml2 2.7.7
apple iphone_os *
apple iphone_os 1.0.0
apple iphone_os 1.0.1
apple iphone_os 1.0.2
apple iphone_os 1.1.0
apple iphone_os 1.1.1
apple iphone_os 1.1.2
apple iphone_os 1.1.3
apple iphone_os 1.1.4
apple iphone_os 1.1.5
apple iphone_os 2.0
apple iphone_os 2.0.0
apple iphone_os 2.0.1
apple iphone_os 2.0.2
apple iphone_os 2.1
apple iphone_os 2.1.1
apple iphone_os 2.2
apple iphone_os 2.2.1
apple iphone_os 3.0
apple iphone_os 3.0.1
apple iphone_os 3.1
apple iphone_os 3.1.2
apple iphone_os 3.1.3
apple iphone_os 3.2
apple iphone_os 3.2.1
apple iphone_os 3.2.2
apple iphone_os 4.0
apple iphone_os 4.0.1
apple iphone_os 4.0.2
apple iphone_os 4.1
apple iphone_os 4.2.1
apple iphone_os 4.2.5
apple iphone_os 4.2.8
apple iphone_os 4.3.0
apple iphone_os 4.3.1
apple iphone_os 4.3.2
apple iphone_os 4.3.3
apple iphone_os 4.3.5
apple iphone_os 5.0
apple iphone_os 5.0.1
apple iphone_os 5.1
apple iphone_os 5.1.1
apple iphone_os 6.0
apple iphone_os 6.0.1
apple iphone_os 6.0.2
apple iphone_os 6.1
apple iphone_os 6.1.2
apple iphone_os 6.1.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D345382F-517F-4829-99AA-D70F5EAFF2A7",
                     versionEndIncluding: "2.7.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2524F0A-AC51-44CB-A4ED-09B70C7E19A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "569432A3-3145-40CD-BFA8-6B70BE47F3E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9635F852-0577-45F6-A301-8DF8108860A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2E409CD-F17C-4A1F-8F84-5E495B2D4652",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E08C8CA8-9F4E-4591-9DDC-C1102F691647",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E973C066-2745-49B5-9FDA-CCD6CE0633B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8070C75-15A8-4A9D-AA0F-4D92CC2691ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6EDF7C8-50C8-4A20-975E-06B2D528E2B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE252FCD-647B-4586-A8EC-6BB095BB3E95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5291EC59-4016-40B3-BF08-292080D19243",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A84CCC4-6F7E-4563-AE45-AF6B45A7D1B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E74FC5-77EE-42A9-B2F7-6C4FC2F0CD20",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "FADFC1E5-2F83-484B-852B-D71B7D1C5A80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2779B6F-AA9F-4D2D-9DD1-9BC9A9042DD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B172A659-DC83-483D-8DBE-637E89DF3DFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3FD4D7C-1826-4BC9-BCEA-6FB8D7738D51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "52800CB4-6389-4AB0-A098-8F465CF4A733",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:1.8.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D499267-5C14-4888-92C7-2ECE909BD9F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "586C0FAB-E288-4EFB-8946-4535971F23F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "15236DDC-0095-4253-9113-61F76EFC0769",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "98F95AB1-D3D0-4E39-B135-4B55991845CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "392E4AA7-00D2-45B1-9FA7-C1C7C37431F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*",
                     matchCriteriaId: "C7839A86-59AA-400C-BF29-18E612B8EB4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F9A211A-5C44-4BDC-9676-3B7B937835B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BECA085A-BEF1-4AD2-ABBA-069CE2642796",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E66BF7BC-5B5C-40BB-B826-3CC9DBAB53D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F330D609-31EB-4B4C-B007-ACEABA557F54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9E2F05B-B298-489C-9E44-62E0A199E148",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "070B2F1F-9A99-4A20-9BA9-CF175D482DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "25DC5AE4-9DEA-4828-96F0-57BACB6C9B25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDE26E6D-53FF-4001-8F25-C112635CB74E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1210A8D-5359-4FD4-963F-506200AA20AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA748E50-798F-40EA-B252-0A166DEEB120",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5B9E7CC-D552-4C9A-909E-42D375452E09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C20B5C-16E7-4C1B-A2DB-8EB4B9A7045D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7A901B3-B0F4-4D2B-8CAF-25938219B657",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "12FCBA01-D739-4BA2-83F5-D41A6DF91F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFC8C43D-84C7-4C0C-8DD1-66206D665C35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E60C1B4-BBC1-4E2B-8323-A7E059EF6BEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B677850-4FE9-4522-ADAE-42C5D17D4A7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB7931B-55AA-4735-8AAB-9F3A9E9C0123",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A5B9AF-7F82-4EEC-A776-587C6DD44448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "94D33392-DD5C-4704-BECF-69D416F9F2C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1BA896F-07D7-4B93-939B-B6CDD1DCA87C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "647CA5AD-5AC2-448E-8445-62837F413361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "37D4241B-A328-45F0-9FAB-CEE20DC7432E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAAD77C4-84EC-4924-90F8-35A2375AA6A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A124C5A-C72C-4623-925E-378FF40671EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ACD2FD4-E884-4FC5-842B-86AAE06D9E05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "14A9036D-1474-4097-9E70-09F7BBA2826C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8884CF6-2F5B-465F-841B-3C69EC3BE3BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A699B966-3756-4D5B-8693-0678EEDD8AD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1E50FED-4BAD-4D04-98C3-C2427E086C1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "70880522-BBC0-4D5C-8DA3-245E189FA1C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A8BA1A0-F8E7-4B93-B667-D012C91F831E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "27662848-9CD5-43BC-9A1B-8C6EBACCCC21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C967E50C-E7AA-49D0-A055-20CA083CA232",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA398ACA-73C2-4093-AD35-E30161C96C25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "757B5A74-6B7B-4F01-9891-9F9E510074C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C10CC4C-3A9C-4AD0-A7C1-ACF781BF20D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E67FD94-4E96-4FCC-990B-4C0A5C599ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E7DDE27-9DE8-4E45-AFA2-AFFEA8F0D917",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "92CEEDA7-5DFC-4DB0-989E-F356E5CF65A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "25D60B58-3558-4244-A5B3-8D16F53A9588",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5DB409B-795F-4F8A-85E1-0B4E66AE9D48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "457C47ED-A429-42AE-9FF9-978D605BACFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C20B9D5-9E10-4B6D-8095-B2A63EDB8D16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "9087E4FE-661F-4803-BB3B-09D2699265E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C2D01CF-9FCE-41F8-997E-EA9BDCCD8C76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "84E1C7A6-DCA7-4760-B1B6-EFB256978CFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F1E7CFF-E4B3-4B31-BE23-C187544E9488",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "81EDD077-5183-4588-8DB1-93A0597AAA34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "530FE28C-0D51-4BF9-AE43-D65F9913B48B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "F030053E-2292-42E2-8435-0CFBDDE688DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0258377-DD8B-4FA6-B075-E8489C83CEAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "69E0BD23-38C6-43C0-870F-00B13F7C91D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3D3350E-5186-4DC8-9D1B-59068A469496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "F76783D0-63F8-48A7-85FE-E5E8DBFA223D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "52AE89B2-C1A3-48C8-AEB5-4B0D757AE361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ACA170D-21DB-47CD-AD73-2DEB2A2439F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFC48A66-7D1F-4446-BC50-6C1A1DF819E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A86D90-C64E-4850-8D6E-94D3C0789241",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "06A50725-AC7A-4FDB-887A-3DCB369C943D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D463EC3C-88F1-46D9-ADB6-6283DC23B0B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F8E361-E6D3-4666-B18D-928D550FD5D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6948CD9-8489-46BA-9159-24C842490702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "35C43087-760E-482A-B34E-141A29AC57A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "669211F7-90EA-47AB-A787-34DD79DF8E25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "025B16D8-1023-4D47-BADD-C1E838B47D88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "320E691F-D417-4D81-A223-C46FEFFD908A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F3B06B40-327D-4EFA-AD19-DA1CA7D50B4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB8BEC58-AB2A-4953-A2E8-338EB894A494",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABDE6C9A-4F24-42B4-8AA3-3EBC97190322",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "44FB2813-BE9F-46A8-864B-435D883CA0FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9DF1336-F831-4507-B45E-574BDE8AA8BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "33268B2F-3591-48D9-B123-92E3ABF157F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "0830367A-9FB3-4291-88C0-38A471DFD22B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "73E4EB1B-2E8B-4504-AB05-F4D4E6B038E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5815E25-5305-4A32-81B3-89DB1D5C1AC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD69C98-11AB-4BB5-A91A-F029BA0E1DB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "98CF3A74-B9F8-4689-B81C-F579D827DA5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DBD9C7D-CD0B-4B5B-BEC2-F67610DEDE2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*",
                     matchCriteriaId: "798F7A01-F006-4589-82F8-943F81015693",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A1C90C5-1B77-4BE5-ACDA-1F15D3F2A000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*",
                     matchCriteriaId: "36940C55-BFD4-4C77-A26B-C0F273EAC2EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*",
                     matchCriteriaId: "8ECB753E-430C-4DBD-9063-506E749A21CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EBD3E93-1624-4B1D-8F9A-5683ADA4983E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*",
                     matchCriteriaId: "551B91B8-7A5A-4E5D-AAED-76705F8A2829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D8135B1-FB22-4755-A5ED-CDB16E3E85A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4685BF-394A-4426-980A-2B1D37737C06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*",
                     matchCriteriaId: "77A68008-7392-4BE4-AB30-24D2BA124E3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*",
                     matchCriteriaId: "63F37BF5-D4D2-43AB-841A-E9AC32A68452",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB8A074B-069A-4520-8E3C-AB614C31B68A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "D77DE5FD-060A-4AD6-A925-4E9EF186C835",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*",
                     matchCriteriaId: "7069A49C-038C-4E7B-AF03-4D90D5734414",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E895B9-5AF7-4A1F-B740-B3E13DE3254E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FD29EFD-1ADB-4349-8E7D-EA6B34B0F6DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC720A50-9EF5-4B73-86D1-AE87D402611E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "464942E8-EDF3-4ECB-B907-FFCDBC9079C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1246C0E-DCAC-405E-ADCE-3D16D659C567",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5703D8EC-259B-49C3-AADE-916227DEB96F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "184B40E3-28FD-49A4-9560-5E26293D7D08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CCE8BBA-6721-4257-9F2E-23AEB104564E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D746FCB4-9ACA-425D-929F-F46EDDEC1B56",
                     versionEndIncluding: "6.1.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E28FB0CB-D636-4F85-B5F7-70EC30053925",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EC16D1C-065A-4D1A-BA6E-528A71DF65CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "27319629-171F-42AA-A95F-2D71F78097D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "297F9438-0F04-4128-94A8-A504B600929E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8618621-F871-4531-9F6C-7D60F2BF8B75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "824DED2D-FA1D-46FC-8252-6E25546DAE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1641DDFA-3BF1-467F-8EC3-98114FF9F07B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF40CDA4-4716-4815-9ED0-093FE266734C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D06D54D-97FD-49FD-B251-CC86FBA68CA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "25A5D868-0016-44AB-80E6-E5DF91F15455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "863383DA-0BC6-4A96-835A-A96128EC0202",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "51D3BE2B-5A01-4AD4-A436-0056B50A535D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A20F171-79FE-43B9-8309-B18341639FA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "126EF22D-29BC-4366-97BC-B261311E6251",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A939B80-0AD0-48AF-81A7-370716F56639",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28528CE-4943-4F82-80C0-A629DA3E6702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "12E22AF0-2B66-425A-A1EE-4F0E3B0433E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB34ECBE-33E8-40E1-936B-7800D2525AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "107C59BE-D8CF-4A17-8DFB-BED2AB12388D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "36C86BB9-0328-4E34-BC2B-47B3471EC262",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A54A8681-2D8A-4B0B-A947-82F3CE1FB03C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0070D83-2E27-4DA8-8D10-A6A697216F36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C9ACA63-4528-4090-B1EA-1FE57A6B0555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7252935C-E421-4339-B61F-0299E28888DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DD342BF-096A-4082-B700-19629F2BDE87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "93141AB6-26F2-4C6D-95B3-D383EABB4034",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D5C61FF-7CD3-410A-94F2-5DE701466B1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A01C87-B02A-4239-8340-B396D0E6B21C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "06980521-B0EA-434D-89AD-A951EAF1D23F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3AE6A93-3977-4B32-B2F6-55C94387DDE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E78F1F2C-2BFF-4D55-A754-102D6C42081B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A4AF71-8E71-432A-B908-361DAF99F4B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEE0068D-C699-4646-9658-610409925A79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "87C215DD-BC98-4283-BF13-69556EF7CB78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C3966E-C136-47A9-B5B4-70613756ED27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "22AD2A1F-A637-47DE-A69F-DAE4ABDFA4BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6D398B8-821B-4DE9-ADF1-4983051F964C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CCE5F2-4D32-404B-BAAC-E64F11BD41FB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.",
      },
      {
         lang: "es",
         value: "libxml2 v2.8.0 y anteriores calcula los valores de hash sin restringir la capacidad de provocar colisiones hash predecibles, lo que permite a atacantes dependientes de contexto provocar una denegación de servicio (consumo de CPU) a través datos XML modificados.",
      },
   ],
   id: "CVE-2012-0841",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-12-21T05:46:14.993",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846",
      },
      {
         source: "secalert@redhat.com",
         url: "http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2012-0324.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://rhn.redhat.com/errata/RHSA-2013-0217.html",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/54886",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/55568",
      },
      {
         source: "secalert@redhat.com",
         url: "http://securitytracker.com/id?1026723",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.apple.com/kb/HT5934",
      },
      {
         source: "secalert@redhat.com",
         url: "http://support.apple.com/kb/HT6001",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.debian.org/security/2012/dsa-2417",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.openwall.com/lists/oss-security/2012/02/22/1",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/52107",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
      },
      {
         source: "secalert@redhat.com",
         url: "http://xmlsoft.org/news.html",
      },
      {
         source: "secalert@redhat.com",
         url: "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2012-0324.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2013-0217.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/54886",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/55568",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1026723",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.apple.com/kb/HT5934",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.apple.com/kb/HT6001",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2012/dsa-2417",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2012/02/22/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/52107",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://xmlsoft.org/news.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.