9.8
CVSSv3

CVE-2016-4658

Published: 25/09/2016 Updated: 13/03/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

xpointer.c in libxml2 prior to 2.9.5 (as used in Apple iOS prior to 10, OS X prior to 10.12, tvOS prior to 10, and watchOS prior to 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote malicious users to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os

apple mac os x

apple tvos

apple watchos

xmlsoft libxml2

Vendor Advisories

Synopsis Important: Red Hat OpenShift GitOps security update Type/Severity Security Advisory: Important Topic An update for openshift-gitops-applicationset-container, openshift-gitops-container, openshift-gitops-kam-delivery-container, and openshift-gitops-operator-container is now available for Red Hat OpenShift GitOps 12 (GitOps v122)Re ...
Several security issues were fixed in libxml2 ...
Debian Bug report logs - #840553 libxml2: CVE-2016-4658 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 12 Oct 2016 18:18:02 UTC Severity: grave Tags: fixed-upstream, patch, secur ...
Debian Bug report logs - #840554 libxml2: CVE-2016-5131 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 12 Oct 2016 18:21:01 UTC Severity: grave Tags: fixed-upstream, patch, secur ...
xpointerc in libxml2 before 295 (as used in Apple iOS before 10, OS X before 1012, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document ( ...
A use-after-free vulnerability via namespace nodes in XPointer ranges was found in libxml2 ...

Github Repositories

Nagios plugin to monitor ruby applications for security vulnerabilities via bundler-audit.

Nagios check_bundle_audit Nagios plugin to monitor ruby applications for security vulnerabilities via bundler-audit Installation Install the bundler-audit gem Download the check_bundle_audit script and make it executable Define a new command in the Nagios config, eg define command { command_name check_bundle_audit command_line $USER1$/check_bundle_audit -p /