8.1

CVE-2016-1762

Exploit

The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.

Data is provided by the National Vulnerability Database (NVD)
AppleSafari Version < 9.1
AppleiPhone OS Version < 9.3
ApplemacOS X Version < 10.11.4
AppletvOS Version < 9.2
ApplewatchOS Version < 2.2
DebianDebian Linux Version8.0
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionlts
XmlsoftLibxml2 Version < 2.9.4
McafeeWeb Gateway Version <= 7.5.2.10
McafeeWeb Gateway Version > 7.5.2.11 <= 7.6.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 8.58% 0.921
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
nvd@nist.gov 5.8 8.6 4.9
AV:N/AC:M/Au:N/C:P/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://xmlsoft.org/news.html
Vendor Advisory
Release Notes
http://www.securitytracker.com/id/1035353
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/85059
Third Party Advisory
VDB Entry
https://bugzilla.gnome.org/show_bug.cgi?id=759671
Third Party Advisory
Exploit
Issue Tracking