9.8
CVSSv3

CVE-2016-4448

Published: 09/06/2016 Updated: 12/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Format string vulnerability in libxml2 prior to 2.9.4 allows malicious users to have unspecified impact via format string specifiers in unknown vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hp icewall_federation_agent 3.0

apple watchos

apple mac os x

xmlsoft libxml2

apple icloud

apple iphone os

redhat enterprise linux desktop 7.0

redhat enterprise linux server aus 7.2

redhat enterprise linux workstation 7.0

redhat enterprise linux server tus 7.2

redhat enterprise linux server 7.0

redhat enterprise linux server eus 7.2

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux server tus 7.3

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.3

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux server eus 7.7

redhat enterprise linux server aus 7.7

redhat enterprise linux server tus 7.7

apple itunes

slackware slackware linux 14.1

slackware slackware linux 14.0

oracle vm server 3.4

oracle vm server 3.3

apple tvos

tenable log correlation engine 4.8.0

mcafee web gateway

oracle linux 7

oracle linux 6

Vendor Advisories

Synopsis Important: Red Hat JBoss Core Services Apache HTTP 2423 Release Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services httpd 2423 is now available from the Red Hat Customer Portal for Solaris and Microsoft Windows systemsRed Hat Product Security has rated this release as ...
Debian Bug report logs - #829718 libxml2: CVE-2016-4448 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 5 Jul 2016 15:12:02 UTC Severity: important Tags: fixed-upstream, patch, s ...
Several security issues were fixed in libxml2 ...
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or execute arbitrary code with the permissions of the user running the application (CVE-2016-1 ...
Format string vulnerability in libxml2 before 294 allows attackers to have unspecified impact via format string specifiers in unknown vectors ...
The Log Correlation Engine (LCE) is potentially impacted by several vulnerabilities in OpenSSL (20160503), libpcre / PCRE, Libxml2, Handlebars, libcurl, and jQuery that were recently disclosed and fixed Note that due to the time involved in doing a full analysis of each issue, Tenable has opted to upgrade the included versions of each library as a ...

References

CWE-134https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5bhttps://bugzilla.redhat.com/show_bug.cgi?id=1338700http://www.openwall.com/lists/oss-security/2016/05/25/2http://xmlsoft.org/news.htmlhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722https://access.redhat.com/errata/RHSA-2016:1292http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.htmlhttp://lists.apple.com/archives/security-announce/2016/Jul/msg00000.htmlhttps://support.apple.com/HT206904https://support.apple.com/HT206899https://support.apple.com/HT206902http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.htmlhttp://lists.apple.com/archives/security-announce/2016/Jul/msg00005.htmlhttps://support.apple.com/HT206905https://support.apple.com/HT206903http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.htmlhttps://support.apple.com/HT206901https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlhttp://www.securityfocus.com/bid/90856https://kc.mcafee.com/corporate/index?page=content&id=SB10170https://www.tenable.com/security/tns-2016-18http://www.securitytracker.com/id/1036348http://rhn.redhat.com/errata/RHSA-2016-2957.htmlhttps://access.redhat.com/errata/RHSA-2016:2957https://nvd.nist.govhttps://usn.ubuntu.com/3235-1/