5.5

CVE-2016-1833

Exploit

The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AppleiPhone OS Version < 9.3.2
ApplemacOS X Version < 10.11.5
AppletvOS Version < 9.2.1
ApplewatchOS Version < 2.2.1
DebianDebian Linux Version8.0
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionlts
XmlsoftLibxml2 Version < 2.9.4
McafeeWeb Gateway Version >= 7.5.0.0 <= 7.5.2.10
McafeeWeb Gateway Version > 7.6.0.0 <= 7.6.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.21% 0.782
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.5 1.8 3.6
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE-125 Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.

http://xmlsoft.org/news.html
Vendor Advisory
Release Notes
http://www.securitytracker.com/id/1035890
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/90691
Third Party Advisory
VDB Entry
https://bugs.chromium.org/p/project-zero/issues/detail?id=636
Third Party Advisory
Exploit
Mailing List
https://bugzilla.gnome.org/show_bug.cgi?id=758606
Third Party Advisory
Exploit
Issue Tracking