AIX 6.1 TL 9 : libxml2 (IV80588)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote AIX host has a version of libxml2 installed that is
affected by multiple vulnerabilities.

Description :

The remote AIX host has a version of libxml2 installed that is
affected by the following vulnerabilities :

- A heap-based buffer overflow condition exists in the
xmlParseEntityDecl() and xmlParseConditionalSections()
functions within file parser.c due to a failure to
properly stop parsing invalid input. An unauthenticated,
remote attacker can exploit this, via specially crafted
XML data, to cause a denial of service condition or
potentially disclose sensitive memory contents.
(CVE-2015-7941)

- A heap-based buffer overflow condition exists in the
xmlParseConditionalSections() function within file
parser.c due to not properly skipping intermediary
entities. An unauthenticated, remote attacker can
exploit this, via specially crafted XML data, to cause a
denial of service condition. (CVE-2015-7942)

- A buffer overflow condition exists in the xmlNextChar()
function due to improper bounds checking. A local
attacker can exploit this, via a malformed XML file, to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2015-8241)

See also :

http://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc

Solution :

Install the appropriate interim fix.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: AIX Local Security Checks

Nessus Plugin ID: 88883 ()

Bugtraq ID: 74241
77621
79507

CVE ID: CVE-2015-7941
CVE-2015-7942
CVE-2015-8241

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now