CVE-2016-4448

CRITICAL
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.

References

http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html

http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html

http://rhn.redhat.com/errata/RHSA-2016-2957.html

http://www.openwall.com/lists/oss-security/2016/05/25/2

http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/90856

http://www.securitytracker.com/id/1036348

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722

http://xmlsoft.org/news.html

https://access.redhat.com/errata/RHSA-2016:1292

https://bugzilla.redhat.com/show_bug.cgi?id=1338700

https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9

https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709

https://kc.mcafee.com/corporate/index?page=content&id=SB10170

https://support.apple.com/HT206899

https://support.apple.com/HT206901

https://support.apple.com/HT206902

https://support.apple.com/HT206903

https://support.apple.com/HT206904

https://support.apple.com/HT206905

https://www.tenable.com/security/tns-2016-18

Details

Source: MITRE

Published: 2016-06-09

Updated: 2019-12-27

Type: CWE-134

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* versions up to 2.2.1 (inclusive)

Configuration 3

OR

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* versions up to 2.9.3 (inclusive)

Configuration 5

AND

OR

cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to 9.3.2 (inclusive)

Configuration 7

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*

OR

cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Configuration 9

OR

cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*

Configuration 10

OR

cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*

cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*

Configuration 11

OR

cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to 9.2.1 (inclusive)

Configuration 12

OR

cpe:2.3:a:tenable:log_correlation_engine:4.8.0:*:*:*:*:*:*:*

Configuration 13

OR

cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions up to 7.5.2.10 (inclusive)

cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from 7.6.0.0 to 7.6.2.3 (inclusive)

Configuration 14

OR

cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*

Tenable Plugins

View all (24 total)

IDNameProductFamilySeverity
121070Junos OS: Multiple vulnerabilities in libxml2 (JSA10916)NessusJunos Local Security Checks
critical
99492Fedora 24 : libxml2 (2017-be8574d593)NessusFedora Local Security Checks
critical
99491Fedora 25 : libxml2 (2017-a3a47973eb)NessusFedora Local Security Checks
critical
97893Tenable Log Correlation Engine (LCE) < 4.8.1 Multiple VulnerabilitiesNessusMisc.
critical
97793Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : libxml2 vulnerabilities (USN-3235-1)NessusUbuntu Local Security Checks
critical
93154SUSE SLES11 Security Update : libxml2 (SUSE-SU-2016:1604-1)NessusSuSE Local Security Checks
critical
9480Google Chrome < 52.0.2743.82 Multiple VulnerabilitesNessus Network MonitorWeb Clients
critical
9441Mac OS X 10.11.x < 10.11.6 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
9430Apple TV 9.2.x < 9.2.2 Multiple VulnerabilitiesNessus Network MonitorInternet Services
medium
92497Mac OS X 10.9.5 and 10.10.5 Multiple Vulnerabilities (Security Update 2016-004)NessusMacOS X Local Security Checks
critical
92496Mac OS X 10.11.x < 10.11.6 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
92494Apple TV < 9.2.2 Multiple VulnerabilitiesNessusMisc.
critical
92411Apple iTunes < 12.4.2 Multiple Vulnerabilities (uncredentialed check)NessusPeer-To-Peer File Sharing
critical
92410Apple iTunes < 12.4.2 Multiple Vulnerabilities (credentialed check)NessusWindows
critical
92359Apple iOS < 9.3.3 Multiple VulnerabilitiesNessusMobile Devices
critical
92221Amazon Linux AMI : libxml2 (ALAS-2016-719)NessusAmazon Linux Local Security Checks
critical
91808Scientific Linux Security Update : libxml2 on SL6.x, SL7.x i386/x86_64 (20160623)NessusScientific Linux Local Security Checks
critical
91802RHEL 6 / 7 : libxml2 (RHSA-2016:1292)NessusRed Hat Local Security Checks
critical
91800OracleVM 3.3 / 3.4 : libxml2 (OVMSA-2016-0087)NessusOracleVM Local Security Checks
critical
91797Oracle Linux 6 / 7 : libxml2 (ELSA-2016-1292)NessusOracle Linux Local Security Checks
critical
91786CentOS 6 / 7 : libxml2 (CESA-2016:1292)NessusCentOS Local Security Checks
critical
91656SUSE SLED12 / SLES12 Security Update : libxml2 (SUSE-SU-2016:1538-1)NessusSuSE Local Security Checks
critical
91639openSUSE Security Update : libxml2 (openSUSE-2016-733)NessusSuSE Local Security Checks
critical
91353Slackware 14.0 / 14.1 / current : libxml2 (SSA:2016-148-01)NessusSlackware Local Security Checks
critical