openSUSE Security Update : libxslt (openSUSE-2017-609)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for libxslt fixes the following security issues :

- CVE-2017-5029: The xsltAddTextString function in
transform.c lacked a check for integer overflow during a
size calculation, which allowed a remote attacker to
perform an out of bounds memory write via a crafted HTML
page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in
xsltFormatNumberConversion: An empty decimal-separator
could cause a heap overread. This can be exploited to
leak a couple of bytes after the buffer that holds the
pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator
(bsc#934119).

- CVE-2015-7995: Vulnerability in function
xsltStylePreCompute' in preproc.c could cause a type
confusion leading to DoS. (bsc#952474) This update was
imported from the SUSE:SLE-12:Update update project.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1005591
https://bugzilla.opensuse.org/show_bug.cgi?id=1035905
https://bugzilla.opensuse.org/show_bug.cgi?id=934119
https://bugzilla.opensuse.org/show_bug.cgi?id=952474

Solution :

Update the affected libxslt packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 100367 ()

Bugtraq ID:

CVE ID: CVE-2015-7995
CVE-2015-9019
CVE-2016-4738
CVE-2017-5029

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now