CVE-2016-3627

The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
Configurations

Configuration 1 (hide)

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*
cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*
cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

History

10 Feb 2024, 02:43

Type Values Removed Values Added
First Time Redhat enterprise Linux Server Aus
Oracle solaris
Redhat enterprise Linux Server
Redhat jboss Core Services
Redhat enterprise Linux Eus
Redhat
Redhat enterprise Linux Workstation
Oracle
Redhat enterprise Linux Desktop
Oracle vm Server
CWE CWE-20 CWE-674
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html - Mailing List
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1292 - (REDHAT) https://access.redhat.com/errata/RHSA-2016:1292 - Third Party Advisory
References (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10170 - (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10170 - Broken Link
References (GENTOO) https://security.gentoo.org/glsa/201701-37 - (GENTOO) https://security.gentoo.org/glsa/201701-37 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/2 - (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/2 - Mailing List, Patch
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Patch, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1035335 - (SECTRACK) http://www.securitytracker.com/id/1035335 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Patch, Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2994-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2994-1 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/84992 - (BID) http://www.securityfocus.com/bid/84992 - Broken Link, Third Party Advisory, VDB Entry
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html - Mailing List
References (DEBIAN) https://www.debian.org/security/2016/dsa-3593 - (DEBIAN) https://www.debian.org/security/2016/dsa-3593 - Mailing List
References (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/3 - (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/3 - Mailing List
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Patch, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2016/May/10 - (FULLDISC) http://seclists.org/fulldisclosure/2016/May/10 - Mailing List, Patch, Third Party Advisory
References (CONFIRM) https://www.tenable.com/security/tns-2016-18 - (CONFIRM) https://www.tenable.com/security/tns-2016-18 - Third Party Advisory
References (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 - (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2957.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2957.html - Third Party Advisory
CPE cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

Information

Published : 2016-05-17 14:08

Updated : 2024-02-28 15:21


NVD link : CVE-2016-3627

Mitre link : CVE-2016-3627

CVE.ORG link : CVE-2016-3627


JSON object : View

Products Affected

redhat

  • jboss_core_services
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_server
  • enterprise_linux_eus
  • enterprise_linux_workstation

opensuse

  • leap

oracle

  • solaris
  • vm_server

hp

  • icewall_file_manager
  • icewall_federation_agent

debian

  • debian_linux

xmlsoft

  • libxml2

canonical

  • ubuntu_linux
CWE
CWE-674

Uncontrolled Recursion