RHEL 7 : libxml2 (RHSA-2020:1190)

Medium Nessus Plugin ID 135071

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:1190 advisory.

- libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035)

- libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131)

- libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412)

- libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258)

- libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404)

- libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://cwe.mitre.org/data/definitions/252.html

https://cwe.mitre.org/data/definitions/400.html

https://cwe.mitre.org/data/definitions/476.html

https://cwe.mitre.org/data/definitions/400.html

https://access.redhat.com/errata/RHSA-2020:1190

https://access.redhat.com/security/cve/CVE-2015-8035

https://access.redhat.com/security/cve/CVE-2016-5131

https://access.redhat.com/security/cve/CVE-2017-15412

https://access.redhat.com/security/cve/CVE-2017-18258

https://access.redhat.com/security/cve/CVE-2018-14404

https://access.redhat.com/security/cve/CVE-2018-14567

Plugin Details

Severity: Medium

ID: 135071

File Name: redhat-RHSA-2020-1190.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2020/04/01

Updated: 2020/04/21

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2017-15412

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:7::client, cpe:/o:redhat:enterprise_linux:7::computenode, cpe:/o:redhat:enterprise_linux:7::server, cpe:/o:redhat:enterprise_linux:7::workstation, p-cpe:/a:redhat:enterprise_linux:libxml2, p-cpe:/a:redhat:enterprise_linux:libxml2-devel, p-cpe:/a:redhat:enterprise_linux:libxml2-python, p-cpe:/a:redhat:enterprise_linux:libxml2-static

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2020/03/31

Vulnerability Publication Date: 2015/11/18

Reference Information

CVE: CVE-2015-8035, CVE-2016-5131, CVE-2017-15412, CVE-2017-18258, CVE-2018-14404, CVE-2018-14567

BID: 77390, 92053, 102098, 105198

RHSA: 2020:1190

CWE: 252, 400, 476