OracleVM 3.3 : libxml2 (OVMSA-2015-0152)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- Update doc/redhat.gif in tarball

- Add libxml2-oracle-enterprise.patch and update logos in
tarball

- Fix a series of CVEs (rhbz#1286495)

- CVE-2015-7941 Cleanup conditional section error handling

- CVE-2015-8317 Fail parsing early on if encoding
conversion failed

- CVE-2015-7942 Another variation of overflow in
Conditional sections

- CVE-2015-7942 Fix an error in previous Conditional
section patch

- Fix parsing short unclosed comment uninitialized access

- CVE-2015-7498 Avoid processing entities after encoding
conversion failures

- CVE-2015-7497 Avoid an heap buffer overflow in
xmlDictComputeFastQKey

- CVE-2015-5312 Another entity expansion issue

- CVE-2015-7499 Add xmlHaltParser to stop the parser

- CVE-2015-7499 Detect incoherency on GROW

- CVE-2015-7500 Fix memory access error due to incorrect
entities boundaries

- CVE-2015-8242 Buffer overead with HTML parser in push
mode

- Libxml violates the zlib interface and crashes

See also :

http://www.nessus.org/u?1268d569

Solution :

Update the affected libxml2 / libxml2-python packages.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.6
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: OracleVM Local Security Checks

Nessus Plugin ID: 87232 ()

Bugtraq ID:

CVE ID: CVE-2015-5312
CVE-2015-7497
CVE-2015-7498
CVE-2015-7499
CVE-2015-7500
CVE-2015-7941
CVE-2015-7942
CVE-2015-8242
CVE-2015-8317

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now