9.3

CVE-2016-1834

Exploit

Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionlts
AppleiPhone OS Version < 9.3.2
ApplemacOS X Version < 10.11.5
AppletvOS Version < 9.2.1
ApplewatchOS Version < 2.2.1
DebianDebian Linux Version8.0
XmlsoftLibxml2 Version < 2.9.4
McafeeWeb Gateway Version >= 7.5.0.0 <= 7.5.2.10
McafeeWeb Gateway Version >= 7.6.0.0 <= 7.6.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.37% 0.844
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://xmlsoft.org/news.html
Vendor Advisory
Release Notes
http://www.securitytracker.com/id/1035890
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/90691
Third Party Advisory
VDB Entry
https://bugzilla.gnome.org/show_bug.cgi?id=763071
Third Party Advisory
Exploit
Issue Tracking