RHEL 6 / 7 : libxml2 (RHSA-2016:1292)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for libxml2 is now available for Red Hat Enterprise Linux 6
and Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

The libxml2 library is a development toolbox providing the
implementation of various XML standards.

Security Fix(es) :

A heap-based buffer overflow flaw was found in the way libxml2 parsed
certain crafted XML input. A remote attacker could provide a specially
crafted XML file that, when opened in an application linked against
libxml2, would cause the application to crash or execute arbitrary
code with the permissions of the user running the application.
(CVE-2016-1834, CVE-2016-1840)

Multiple denial of service flaws were found in libxml2. A remote
attacker could provide a specially crafted XML file that, when
processed by an application using libxml2, could cause that
application to crash. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1835,
CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839,
CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448,
CVE-2016-4449)

See also :

https://www.redhat.com/security/data/cve/CVE-2016-1762.html
https://www.redhat.com/security/data/cve/CVE-2016-1833.html
https://www.redhat.com/security/data/cve/CVE-2016-1834.html
https://www.redhat.com/security/data/cve/CVE-2016-1835.html
https://www.redhat.com/security/data/cve/CVE-2016-1836.html
https://www.redhat.com/security/data/cve/CVE-2016-1837.html
https://www.redhat.com/security/data/cve/CVE-2016-1838.html
https://www.redhat.com/security/data/cve/CVE-2016-1839.html
https://www.redhat.com/security/data/cve/CVE-2016-1840.html
https://www.redhat.com/security/data/cve/CVE-2016-3627.html
https://www.redhat.com/security/data/cve/CVE-2016-3705.html
https://www.redhat.com/security/data/cve/CVE-2016-4447.html
https://www.redhat.com/security/data/cve/CVE-2016-4448.html
https://www.redhat.com/security/data/cve/CVE-2016-4449.html
http://rhn.redhat.com/errata/RHSA-2016-1292.html

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:U/RL:ND/RC:UR)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now