9.8

CVE-2016-0718

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

Data is provided by the National Vulnerability Database (NVD)
MozillaFirefox Version < 48.0
ApplemacOS X Version >= 10.11.0 <= 10.11.5
SuseLinux Enterprise Debuginfo Version11 Updatesp4
SuseStudio Onsite Version1.3
SuseLinux Enterprise Server Version11 Updatesp4
OpensuseLeap Version42.1
SuseLinux Enterprise Desktop Version12 Update-
SuseLinux Enterprise Desktop Version12 Updatesp1
SuseLinux Enterprise Server Version12 Update-
SuseLinux Enterprise Server Version12 Updatesp1
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version16.04 SwEditionlts
Libexpat ProjectLibexpat Version < 2.2.0
DebianDebian Linux Version8.0
OpensuseOpensuse Version13.1
OpensuseOpensuse Version13.2
McafeePolicy Auditor Version < 6.5.1
PythonPython Version >= 2.7.0 < 2.7.15
PythonPython Version >= 3.3.0 < 3.3.7
PythonPython Version >= 3.4.0 < 3.4.7
PythonPython Version >= 3.5.0 < 3.5.4
PythonPython Version >= 3.6.0 < 3.6.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.5% 0.805
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://seclists.org/fulldisclosure/2017/Feb/68
Third Party Advisory
Mailing List
http://support.eset.com/ca6333/
Third Party Advisory
http://www.securityfocus.com/bid/90729
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036348
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036415
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1037705
Third Party Advisory
VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
Third Party Advisory
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1296102
Third Party Advisory
Issue Tracking