CVE-2016-3705

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.

References

http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html

http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html

http://rhn.redhat.com/errata/RHSA-2016-2957.html

http://seclists.org/fulldisclosure/2016/May/10

http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/89854

http://www.ubuntu.com/usn/USN-2994-1

https://access.redhat.com/errata/RHSA-2016:1292

https://bugzilla.gnome.org/show_bug.cgi?id=765207

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239

https://kc.mcafee.com/corporate/index?page=content&id=SB10170

https://security.gentoo.org/glsa/201701-37

https://www.debian.org/security/2016/dsa-3593

https://www.tenable.com/security/tns-2016-18

Details

Source: MITRE

Published: 2016-05-17

Updated: 2018-10-30

Type: CWE-20

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
121070Junos OS: Multiple vulnerabilities in libxml2 (JSA10916)NessusJunos Local Security Checks
critical
97893Tenable Log Correlation Engine (LCE) < 4.8.1 Multiple VulnerabilitiesNessusMisc.
critical
96541GLSA-201701-37 : libxml2: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
95966F5 Networks BIG-IP : libxml2 vulnerabilities (K54225343)NessusF5 Networks Local Security Checks
high
93154SUSE SLES11 Security Update : libxml2 (SUSE-SU-2016:1604-1)NessusSuSE Local Security Checks
critical
93145FreeBSD : libxml2 -- multiple vulnerabilities (e195679d-045b-4953-bb33-be0073ba2ac6)NessusFreeBSD Local Security Checks
high
92221Amazon Linux AMI : libxml2 (ALAS-2016-719)NessusAmazon Linux Local Security Checks
critical
91808Scientific Linux Security Update : libxml2 on SL6.x, SL7.x i386/x86_64 (20160623)NessusScientific Linux Local Security Checks
critical
91802RHEL 6 / 7 : libxml2 (RHSA-2016:1292)NessusRed Hat Local Security Checks
critical
91800OracleVM 3.3 / 3.4 : libxml2 (OVMSA-2016-0087)NessusOracleVM Local Security Checks
critical
91797Oracle Linux 6 / 7 : libxml2 (ELSA-2016-1292)NessusOracle Linux Local Security Checks
critical
91786CentOS 6 / 7 : libxml2 (CESA-2016:1292)NessusCentOS Local Security Checks
critical
91656SUSE SLED12 / SLES12 Security Update : libxml2 (SUSE-SU-2016:1538-1)NessusSuSE Local Security Checks
critical
91640openSUSE Security Update : libxml2 (openSUSE-2016-734)NessusSuSE Local Security Checks
high
91639openSUSE Security Update : libxml2 (openSUSE-2016-733)NessusSuSE Local Security Checks
critical
91499Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : libxml2 vulnerabilities (USN-2994-1)NessusUbuntu Local Security Checks
high
91472Debian DLA-503-1 : libxml2 security updateNessusDebian Local Security Checks
high
91447Debian DSA-3593-1 : libxml2 - security updateNessusDebian Local Security Checks
high
91409openSUSE Security Update : libxml2 (openSUSE-2016-662)NessusSuSE Local Security Checks
high