5.5
CVSSv3

CVE-2016-9318

Published: 16/11/2016 Updated: 08/04/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

libxml2 2.9.4 and previous versions, as used in XMLSec 1.2.23 and previous versions and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote malicious users to conduct XML External Entity (XXE) attacks via a crafted document.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xmlsoft libxml2

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

Vendor Advisories

Synopsis Important: Red Hat JBoss Core Services Apache HTTP Server 2429 security update Type/Severity Security Advisory: Important Topic Red Hat JBoss Core Services Pack Apache Server 2429 packages for Microsoft Windows and Oracle Solaris are now availableRed Hat Product Security has rated this release ...
Several security issues were fixed in libxml2 ...
Several security issues were fixed in libxml2 ...
Debian Bug report logs - #844581 libxml2: CVE-2016-9318 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 17 Nov 2016 05:30:01 UTC Severity: important Tags: fixed-upstream, security ...
Debian Bug report logs - #840553 libxml2: CVE-2016-4658 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 12 Oct 2016 18:18:02 UTC Severity: grave Tags: fixed-upstream, patch, secur ...
Debian Bug report logs - #840554 libxml2: CVE-2016-5131 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 12 Oct 2016 18:21:01 UTC Severity: grave Tags: fixed-upstream, patch, secur ...
libxml2 294 and earlier, as used in XMLSec 1223 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document ...