Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2018.0048
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2018-0048)
Resumen:The remote host is missing an update for the 'libxml2, perl-XML-LibXML' package(s) announced via the MGASA-2018-0048 advisory.
Descripción:Summary:
The remote host is missing an update for the 'libxml2, perl-XML-LibXML' package(s) announced via the MGASA-2018-0048 advisory.

Vulnerability Insight:
Use-after-free error could lead to crash (CVE-2016-4658).

Use-after-free vulnerability in libxml2 through 2.9.4 allows remote
attackers to cause a denial of service or possibly have unspecified
other impact via vectors related to the XPointer range-to function
(CVE-2016-5131).

libxml2 2.9.4 and earlier does not offer a flag directly indicating that
the current document may be read but other files may not be opened,
which makes it easier for remote attackers to conduct XML External
Entity (XXE) attacks via a crafted document (CVE-2016-9318).

Heap buffer overflow in xmlAddID (CVE-2017-0663).

Integer overflow in memory debug code in libxml2 before 2.9.5
(CVE-2017-5130).

NULL pointer deref in xmlDumpElementContent (CVE-2017-5969).

Prevent unwanted external entity reference (CVE-2017-7375).

Increase buffer space for port in HTTP redirect support (CVE-2017-7376).

The function xmlSnprintfElementContent in valid.c was vulnerable to a
stack buffer overflow (CVE-2017-9047, CVE-2017-9048).

The function xmlDictComputeFastKey in dict.c was vulnerable to a
heap-based buffer over-read (CVE-2017-9049).

The function xmlDictAddString was vulnerable to a heap-based buffer
over-read (CVE-2017-9050).

It was discovered that libxml2 incorrecty handled certain files. An
attacker could use this issue with specially constructed XML data to
cause libxml2 to consume resources, leading to a denial of service
(CVE-2017-15412).

Wei Lei discovered that libxml2 incorrecty handled certain parameter
entities. An attacker could use this issue with specially constructed
XML data to cause libxml2 to consume resources, leading to a denial of
service (CVE-2017-16932).

The libxml2 package has been updated to version 2.9.7 to fix these
issues and several other bugs.

Affected Software/OS:
'libxml2, perl-XML-LibXML' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-4658
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
BugTraq ID: 93054
http://www.securityfocus.com/bid/93054
https://security.gentoo.org/glsa/201701-37
http://www.securitytracker.com/id/1036858
http://www.securitytracker.com/id/1038623
Common Vulnerability Exposure (CVE) ID: CVE-2016-5131
BugTraq ID: 92053
http://www.securityfocus.com/bid/92053
Debian Security Information: DSA-3637 (Google Search)
http://www.debian.org/security/2016/dsa-3637
https://security.gentoo.org/glsa/201610-09
RedHat Security Advisories: RHSA-2016:1485
http://rhn.redhat.com/errata/RHSA-2016-1485.html
http://www.securitytracker.com/id/1036428
SuSE Security Announcement: openSUSE-SU-2016:1865 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
SuSE Security Announcement: openSUSE-SU-2016:1868 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
SuSE Security Announcement: openSUSE-SU-2016:1869 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
SuSE Security Announcement: openSUSE-SU-2016:1918 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
http://www.ubuntu.com/usn/USN-3041-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-9318
BugTraq ID: 94347
http://www.securityfocus.com/bid/94347
https://security.gentoo.org/glsa/201711-01
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
Common Vulnerability Exposure (CVE) ID: CVE-2017-0663
BugTraq ID: 98877
http://www.securityfocus.com/bid/98877
Debian Security Information: DSA-3952 (Google Search)
http://www.debian.org/security/2017/dsa-3952
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2017-15412
Debian Security Information: DSA-4086 (Google Search)
https://www.debian.org/security/2018/dsa-4086
https://security.gentoo.org/glsa/201801-03
https://bugzilla.gnome.org/show_bug.cgi?id=783160
https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
https://crbug.com/727039
https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
RedHat Security Advisories: RHSA-2017:3401
https://access.redhat.com/errata/RHSA-2017:3401
RedHat Security Advisories: RHSA-2018:0287
https://access.redhat.com/errata/RHSA-2018:0287
http://www.securitytracker.com/id/1040348
Common Vulnerability Exposure (CVE) ID: CVE-2017-16932
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
Common Vulnerability Exposure (CVE) ID: CVE-2017-5130
BugTraq ID: 101482
http://www.securityfocus.com/bid/101482
https://security.gentoo.org/glsa/201710-24
http://bugzilla.gnome.org/show_bug.cgi?id=783026
https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
https://crbug.com/722079
https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
https://www.oracle.com/security-alerts/cpuapr2020.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html
RedHat Security Advisories: RHSA-2017:2997
https://access.redhat.com/errata/RHSA-2017:2997
Common Vulnerability Exposure (CVE) ID: CVE-2017-5969
BugTraq ID: 96188
http://www.securityfocus.com/bid/96188
https://bugzilla.gnome.org/show_bug.cgi?id=778519
http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
Common Vulnerability Exposure (CVE) ID: CVE-2017-7375
https://www.debian.org/security/2017/dsa-3952
Common Vulnerability Exposure (CVE) ID: CVE-2017-7376
Common Vulnerability Exposure (CVE) ID: CVE-2017-9047
BugTraq ID: 98599
http://www.securityfocus.com/bid/98599
http://www.openwall.com/lists/oss-security/2017/05/15/1
Common Vulnerability Exposure (CVE) ID: CVE-2017-9048
BugTraq ID: 98556
http://www.securityfocus.com/bid/98556
Common Vulnerability Exposure (CVE) ID: CVE-2017-9049
BugTraq ID: 98601
http://www.securityfocus.com/bid/98601
Common Vulnerability Exposure (CVE) ID: CVE-2017-9050
BugTraq ID: 98568
http://www.securityfocus.com/bid/98568
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.