OracleVM 3.3 / 3.4 : libxml2 (OVMSA-2016-0087)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- Update doc/redhat.gif in tarball

- Add libxml2-oracle-enterprise.patch and update logos in
tarball

- Heap-based buffer overread in xmlNextChar
(CVE-2016-1762)

- Bug 763071: Heap-buffer-overflow in xmlStrncat
(CVE-2016-1834)

- Bug 757711: Heap-buffer-overflow in
xmlFAParsePosCharGroup (CVE-2016-1840)

- Bug 758588: Heap-based buffer overread in
xmlParserPrintFileContextInternal (CVE-2016-1838)

- Bug 758605: Heap-based buffer overread in
xmlDictAddString (CVE-2016-1839)

- Bug 759398: Heap use-after-free in xmlDictComputeFastKey
(CVE-2016-1836)

- Fix inappropriate fetch of entities content
(CVE-2016-4449)

- Heap use-after-free in htmlParsePubidLiteral and
htmlParseSystemiteral (CVE-2016-1837)

- Heap use-after-free in xmlSAX2AttributeNs
(CVE-2016-1835)

- Heap-based buffer-underreads due to xmlParseName
(CVE-2016-4447)

- Heap-based buffer overread in htmlCurrentChar
(CVE-2016-1833)

- Add missing increments of recursion depth counter to XML
parser. (CVE-2016-3705)

- Avoid building recursive entities (CVE-2016-3627)

- Fix some format string warnings with possible format
string vulnerability (CVE-2016-4448)

- More format string warnings with possible format string
vulnerability (CVE-2016-4448)

- Fix large parse of file from memory (rhbz#862969)

See also :

https://bugzilla.gnome.org/show_bug.cgi?id=757711
https://bugzilla.gnome.org/show_bug.cgi?id=758588
https://bugzilla.gnome.org/show_bug.cgi?id=758605
https://bugzilla.gnome.org/show_bug.cgi?id=759398
https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000502.html
https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000501.html

Solution :

Update the affected libxml2 / libxml2-python packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:U/RL:ND/RC:UR)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now