Description
The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
References (22)
Core 22
Core References
Third Party Advisory x_refsource_confirm
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Patch, Third Party Advisory x_refsource_confirm
https://kc.mcafee.com/corporate/index?page=content&id=SB10170
Mailing List, Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
Vendor Advisory x_refsource_confirm
https://support.apple.com/HT206167
Vendor Advisory x_refsource_confirm
https://support.apple.com/HT206168
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2016:1292
Mailing List, Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html
Third Party Advisory x_refsource_confirm
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2016/dsa-3593
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1035353
Mailing List, Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
Release Notes, Vendor Advisory x_refsource_confirm
http://xmlsoft.org/news.html
Exploit, Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.gnome.org/show_bug.cgi?id=759671
Third Party Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2994-1
Mailing List, Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
Patch, Third Party Advisory x_refsource_confirm
https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602
Vendor Advisory x_refsource_confirm
https://support.apple.com/HT206171
Third Party Advisory vendor-advisory
x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2016-2957.html
Mailing List, Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
Vendor Advisory x_refsource_confirm
https://support.apple.com/HT206169
Vendor Advisory x_refsource_confirm
https://support.apple.com/HT206166
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/85059
Scores
CVSS v3
8.1
EPSS
0.0426
EPSS Percentile
88.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-119
CWE-122
Status
published
Products (30)
apple/iphone_os
< 9.3
apple/mac_os_x
< 10.11.4
apple/safari
< 9.1
apple/tvos
< 9.2
apple/watchos
< 2.2
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
15.10
canonical/ubuntu_linux
16.04
debian/debian_linux
8.0
... and 20 more
Published
Mar 24, 2016
Tracked Since
Feb 18, 2026