OracleVM 3.3 / 3.4 : libxml2 (OVMSA-2016-0087)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

The remote OracleVM host is missing one or more security updates.

Description :

The remote OracleVM system is missing necessary patches to address
critical security updates :

- Update doc/redhat.gif in tarball

- Add libxml2-oracle-enterprise.patch and update logos in

- Heap-based buffer overread in xmlNextChar

- Bug 763071: Heap-buffer-overflow in xmlStrncat

- Bug 757711: Heap-buffer-overflow in
xmlFAParsePosCharGroup (CVE-2016-1840)

- Bug 758588: Heap-based buffer overread in
xmlParserPrintFileContextInternal (CVE-2016-1838)

- Bug 758605: Heap-based buffer overread in
xmlDictAddString (CVE-2016-1839)

- Bug 759398: Heap use-after-free in xmlDictComputeFastKey

- Fix inappropriate fetch of entities content

- Heap use-after-free in htmlParsePubidLiteral and
htmlParseSystemiteral (CVE-2016-1837)

- Heap use-after-free in xmlSAX2AttributeNs

- Heap-based buffer-underreads due to xmlParseName

- Heap-based buffer overread in htmlCurrentChar

- Add missing increments of recursion depth counter to XML
parser. (CVE-2016-3705)

- Avoid building recursive entities (CVE-2016-3627)

- Fix some format string warnings with possible format
string vulnerability (CVE-2016-4448)

- More format string warnings with possible format string
vulnerability (CVE-2016-4448)

- Fix large parse of file from memory (rhbz#862969)

See also :

Solution :

Update the affected libxml2 / libxml2-python packages.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.1
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now