7.5
CVSSv2

CVE-2016-0718

Published: 26/05/2016 Updated: 12/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Expat allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

apple mac os x

suse linux enterprise server 11

suse studio onsite 1.3

suse linux enterprise software development kit 11

suse linux enterprise debuginfo 11

opensuse leap 42.1

suse linux enterprise software development kit 12

suse linux enterprise server 12

suse linux enterprise desktop 12

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

libexpat project libexpat

debian debian linux 8.0

opensuse opensuse 13.1

opensuse opensuse 13.2

mcafee policy auditor

python python

Vendor Advisories

Synopsis Moderate: expat security update Type/Severity Security Advisory: Moderate Topic An update for expat is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring S ...
Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2429 security update Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services Pack Apache Server 2429 packages for Microsoft Windows and Oracle Solaris are now availableRed Hat Product Security has rated this release ...
Expat could be made to crash or run programs as your login if it opened a specially crafted file ...
Several security issues were fixed in XML-RPC for C and C++ ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
CVE-2016-0718: Out-of-bounds read flawAn out-of-bounds read flaw was found in the way Expat processed certain inputA remote attacker could send specially crafted XML that, when parsed by anapplication using the Expat library, would cause that application to crash or,possibly, execute arbitrary code with the permission of the user running theapplic ...
Mozilla Foundation Security Advisory 2016-68 Out-of-bounds read during XML parsing in Expat library Announced August 2, 2016 Reporter Gustavo Grieco Impact Moderate Products Firefox Fixed in ...
Nessus has been found to contain four vulnerabilities The first is in the third-party library, libexpat, and the other three are native to Nessus: CVE-2016-0718 - The Expat XML Parser (expat/libexpat) contains an overflow condition that is triggered as user-supplied input is not properly validated when handling malformed input documents This may ...
Tenable's Passive Vulnerability Scanner (PVS) uses third-party libraries to provide certain standardized functionality Four of these libraries were found to contain vulnerabilities and were fixed upstream Those fixes have been integrated despite there being no known exploitation scenarios related to PVS OpenSSL ssl/statem/statemc read_state_ma ...

Exploits

ESET Endpoint Antivirus 6 suffers from a remote code execution vulnerability ...

Recent Articles

ESET antivirus cracks opens Apple Macs to remote root execution via man-in-middle diddle
The Register • Richard Chirgwin • 28 Feb 2017

Get patching – fix available now

Bored hacker looking for fun? We couldn't possibly suggest you attack the latest vulnerability in ESET's antivirus software, because it's too basic to offer any challenge at all. As outlined in this advisory today, all you need to get root-level remote code execution on a Mac is to intercept the ESET antivirus package's connection to its backend servers, put yourself in as a man-in-the-middle, and exploit an XML library hole. Or, to use the technically correct language of Google Security Team's ...

References

CWE-119http://www.openwall.com/lists/oss-security/2016/05/17/12https://bugzilla.redhat.com/show_bug.cgi?id=1296102http://www.debian.org/security/2016/dsa-3582http://www.ubuntu.com/usn/USN-2983-1http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.htmlhttp://lists.apple.com/archives/security-announce/2016/Jul/msg00000.htmlhttps://support.apple.com/HT206903https://bugzilla.mozilla.org/show_bug.cgi?id=1236923http://www.mozilla.org/security/announce/2016/mfsa2016-68.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlhttp://www.ubuntu.com/usn/USN-3044-1http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.htmlhttp://www.securityfocus.com/bid/90729https://source.android.com/security/bulletin/2016-11-01.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.htmlhttp://support.eset.com/ca6333/http://seclists.org/fulldisclosure/2017/Feb/68http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.htmlhttps://security.gentoo.org/glsa/201701-21http://www.securitytracker.com/id/1037705http://www.securitytracker.com/id/1036415http://www.securitytracker.com/id/1036348https://www.tenable.com/security/tns-2016-20http://rhn.redhat.com/errata/RHSA-2016-2824.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://access.redhat.com/errata/RHSA-2018:2486https://kc.mcafee.com/corporate/index?page=content&id=SB10365https://access.redhat.com/errata/RHSA-2016:2824https://nvd.nist.govhttps://usn.ubuntu.com/2983-1/