7.8

CVE-2016-1840

Exploit

Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
DebianDebian Linux Version8.0
AppleiPhone OS Version < 9.3.2
ApplemacOS X Version < 10.11.5
AppletvOS Version < 9.2.1
ApplewatchOS Version < 2.2.1
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version15.10
CanonicalUbuntu Linux Version16.04 SwEditionlts
XmlsoftLibxml2 Version < 2.9.4
McafeeWeb Gateway Version >= 7.5.0.0 <= 7.5.2.10
McafeeWeb Gateway Version >= 7.6.0.0 <= 7.6.2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.14% 0.835
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://xmlsoft.org/news.html
Vendor Advisory
Release Notes
http://www.securitytracker.com/id/1035890
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/90691
Third Party Advisory
VDB Entry
https://bugzilla.gnome.org/show_bug.cgi?id=757711
Third Party Advisory
Exploit
Issue Tracking