6.8
CVSSv2

CVE-2017-0663

Published: 14/06/2017 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 7.1.2

google android 5.0.2

google android 6.0.1

google android 6.0

google android 4.4.4

google android 7.0

google android 5.1.1

google android 7.1.1

Vendor Advisories

Several security issues were fixed in libxml2 ...
Several security issues were fixed in libxml2 ...
Several vulnerabilities were discovered in libxml2, a library providing support to read, modify and write XML and HTML files A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause a denial-of-service against the application, information leaks, or potentially, the execu ...
Debian Bug report logs - #870865 libxml2: CVE-2017-7376: Incorrect limit used for port values Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 5 Aug 2017 20:39:02 UTC Severity: im ...
Debian Bug report logs - #863022 libxml2: CVE-2017-9047: stack overflow in validc Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 May 2017 09:36:02 UTC Severity: important Tag ...
Debian Bug report logs - #870867 libxml2: CVE-2017-7375: Missing validation for external entities in xmlParsePEReference Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 5 Aug 2017 ...
Debian Bug report logs - #870870 libxml2: CVE-2017-0663: Heap buffer overflow in xmlAddID Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 5 Aug 2017 21:03:01 UTC Severity: import ...
Debian Bug report logs - #863019 libxml2: CVE-2017-9049: heap-based buffer overflow in xmlDictComputeFastKey Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 May 2017 09:12:01 UT ...
Debian Bug report logs - #863022 libxml2: CVE-2017-9047: stack overflow in validc Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 May 2017 09:36:02 UTC Severity: important Tag ...
Debian Bug report logs - #863021 libxml2: CVE-2017-9048: another stack overflow in validc Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 May 2017 09:24:01 UTC Severity: impor ...
Debian Bug report logs - #863018 libxml2: CVE-2017-9050: heap-based buffer overflow in xmlDictAddString Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 May 2017 09:03:02 UTC Se ...
A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process This issue is rated as High due to the possibility of remote code execution in an application that uses this library Product: Android Versions: 444, 502, 511, 60, ...