CVE-2016-1836

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.

References

http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html

http://lists.apple.com/archives/security-announce/2016/May/msg00001.html

http://lists.apple.com/archives/security-announce/2016/May/msg00002.html

http://lists.apple.com/archives/security-announce/2016/May/msg00003.html

http://lists.apple.com/archives/security-announce/2016/May/msg00004.html

http://rhn.redhat.com/errata/RHSA-2016-2957.html

http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/90691

http://www.securitytracker.com/id/1035890

http://www.ubuntu.com/usn/USN-2994-1

http://xmlsoft.org/news.html

https://access.redhat.com/errata/RHSA-2016:1292

https://bugzilla.gnome.org/show_bug.cgi?id=759398

https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0

https://kc.mcafee.com/corporate/index?page=content&id=SB10170

https://security.gentoo.org/glsa/201701-37

https://support.apple.com/HT206564

https://support.apple.com/HT206566

https://support.apple.com/HT206567

https://support.apple.com/HT206568

https://support.apple.com/HT206899

https://support.apple.com/HT206901

https://support.apple.com/HT206902

https://support.apple.com/HT206903

https://support.apple.com/HT206904

https://support.apple.com/HT206905

https://www.debian.org/security/2016/dsa-3593

https://www.tenable.com/security/tns-2016-18

Details

Source: MITRE

Published: 2016-05-20

Updated: 2019-03-25

Type: CWE-416

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*

cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from 7.5.0.0 to 7.5.2.10 (inclusive)

cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from 7.6.0.0 to 7.6.2.3 (inclusive)

Tenable Plugins

View all (29 total)

IDNameProductFamilySeverity
99492Fedora 24 : libxml2 (2017-be8574d593)NessusFedora Local Security Checks
critical
99491Fedora 25 : libxml2 (2017-a3a47973eb)NessusFedora Local Security Checks
critical
97893Tenable Log Correlation Engine (LCE) < 4.8.1 Multiple VulnerabilitiesNessusMisc.
critical
96541GLSA-201701-37 : libxml2: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
95943F5 Networks BIG-IP : libxml2 vulnerability (K48220300)NessusF5 Networks Local Security Checks
medium
93145FreeBSD : libxml2 -- multiple vulnerabilities (e195679d-045b-4953-bb33-be0073ba2ac6)NessusFreeBSD Local Security Checks
high
802004macOS < 10.11.5 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
92497Mac OS X 10.9.5 and 10.10.5 Multiple Vulnerabilities (Security Update 2016-004)NessusMacOS X Local Security Checks
critical
92496Mac OS X 10.11.x < 10.11.6 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
92494Apple TV < 9.2.2 Multiple VulnerabilitiesNessusMisc.
critical
92411Apple iTunes < 12.4.2 Multiple Vulnerabilities (uncredentialed check)NessusPeer-To-Peer File Sharing
critical
92410Apple iTunes < 12.4.2 Multiple Vulnerabilities (credentialed check)NessusWindows
critical
92359Apple iOS < 9.3.3 Multiple VulnerabilitiesNessusMobile Devices
critical
92221Amazon Linux AMI : libxml2 (ALAS-2016-719)NessusAmazon Linux Local Security Checks
critical
9392Mac OS X 10.11.x < 10.11.5 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
high
91808Scientific Linux Security Update : libxml2 on SL6.x, SL7.x i386/x86_64 (20160623)NessusScientific Linux Local Security Checks
critical
91802RHEL 6 / 7 : libxml2 (RHSA-2016:1292)NessusRed Hat Local Security Checks
critical
91800OracleVM 3.3 / 3.4 : libxml2 (OVMSA-2016-0087)NessusOracleVM Local Security Checks
critical
91797Oracle Linux 6 / 7 : libxml2 (ELSA-2016-1292)NessusOracle Linux Local Security Checks
critical
91786CentOS 6 / 7 : libxml2 (CESA-2016:1292)NessusCentOS Local Security Checks
critical
91640openSUSE Security Update : libxml2 (openSUSE-2016-734)NessusSuSE Local Security Checks
high
91499Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : libxml2 vulnerabilities (USN-2994-1)NessusUbuntu Local Security Checks
high
91447Debian DSA-3593-1 : libxml2 - security updateNessusDebian Local Security Checks
high
9337Apple TV < 9.2.1 Multiple VulnerabilitiesNessus Network MonitorInternet Services
high
9332Apple iOS < 9.3.2 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
high
91311Apple TV < 9.2.1 Multiple VulnerabilitiesNessusMisc.
high
91229Mac OS X 10.9.5 / 10.10.5 Multiple Vulnerabilities (Security Update 2016-003)NessusMacOS X Local Security Checks
high
91228Mac OS X 10.11.x < 10.11.5 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
91225Apple iOS < 9.3.2 Multiple VulnerabilitiesNessusMobile Devices
high