CVE-2016-3627

The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html Mailing List
http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html Mailing List
http://rhn.redhat.com/errata/RHSA-2016-2957.html Third Party Advisory
http://seclists.org/fulldisclosure/2016/May/10 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/03/21/2 Mailing List Patch
http://www.openwall.com/lists/oss-security/2016/03/21/3 Mailing List
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Patch Third Party Advisory
http://www.securityfocus.com/bid/84992 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1035335 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2994-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1292 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 Broken Link
https://security.gentoo.org/glsa/201701-37 Third Party Advisory
https://www.debian.org/security/2016/dsa-3593 Mailing List
https://www.tenable.com/security/tns-2016-18 Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html Mailing List
http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html Mailing List
http://rhn.redhat.com/errata/RHSA-2016-2957.html Third Party Advisory
http://seclists.org/fulldisclosure/2016/May/10 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/03/21/2 Mailing List Patch
http://www.openwall.com/lists/oss-security/2016/03/21/3 Mailing List
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Patch Third Party Advisory
http://www.securityfocus.com/bid/84992 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1035335 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2994-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1292 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 Broken Link
https://security.gentoo.org/glsa/201701-37 Third Party Advisory
https://www.debian.org/security/2016/dsa-3593 Mailing List
https://www.tenable.com/security/tns-2016-18 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*
cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*
cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:50

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html - Mailing List () http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html - Mailing List
References () http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html - Mailing List () http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html - Mailing List
References () http://rhn.redhat.com/errata/RHSA-2016-2957.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2957.html - Third Party Advisory
References () http://seclists.org/fulldisclosure/2016/May/10 - Mailing List, Patch, Third Party Advisory () http://seclists.org/fulldisclosure/2016/May/10 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/03/21/2 - Mailing List, Patch () http://www.openwall.com/lists/oss-security/2016/03/21/2 - Mailing List, Patch
References () http://www.openwall.com/lists/oss-security/2016/03/21/3 - Mailing List () http://www.openwall.com/lists/oss-security/2016/03/21/3 - Mailing List
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Patch, Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Patch, Third Party Advisory
References () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Patch, Third Party Advisory () http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/84992 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/84992 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1035335 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035335 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2994-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2994-1 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2016:1292 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2016:1292 - Third Party Advisory
References () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 - Third Party Advisory () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 - Third Party Advisory
References () https://kc.mcafee.com/corporate/index?page=content&id=SB10170 - Broken Link () https://kc.mcafee.com/corporate/index?page=content&id=SB10170 - Broken Link
References () https://security.gentoo.org/glsa/201701-37 - Third Party Advisory () https://security.gentoo.org/glsa/201701-37 - Third Party Advisory
References () https://www.debian.org/security/2016/dsa-3593 - Mailing List () https://www.debian.org/security/2016/dsa-3593 - Mailing List
References () https://www.tenable.com/security/tns-2016-18 - Third Party Advisory () https://www.tenable.com/security/tns-2016-18 - Third Party Advisory

10 Feb 2024, 02:43

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html - Mailing List
References (REDHAT) https://access.redhat.com/errata/RHSA-2016:1292 - (REDHAT) https://access.redhat.com/errata/RHSA-2016:1292 - Third Party Advisory
References (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10170 - (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10170 - Broken Link
References (GENTOO) https://security.gentoo.org/glsa/201701-37 - (GENTOO) https://security.gentoo.org/glsa/201701-37 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/2 - (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/2 - Mailing List, Patch
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html - Patch, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1035335 - (SECTRACK) http://www.securitytracker.com/id/1035335 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html - Patch, Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-2994-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-2994-1 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/84992 - (BID) http://www.securityfocus.com/bid/84992 - Broken Link, Third Party Advisory, VDB Entry
References (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html - (SUSE) http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html - Mailing List
References (DEBIAN) https://www.debian.org/security/2016/dsa-3593 - (DEBIAN) https://www.debian.org/security/2016/dsa-3593 - Mailing List
References (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/3 - (MLIST) http://www.openwall.com/lists/oss-security/2016/03/21/3 - Mailing List
References (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - (CONFIRM) http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html - Patch, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2016/May/10 - (FULLDISC) http://seclists.org/fulldisclosure/2016/May/10 - Mailing List, Patch, Third Party Advisory
References (CONFIRM) https://www.tenable.com/security/tns-2016-18 - (CONFIRM) https://www.tenable.com/security/tns-2016-18 - Third Party Advisory
References (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 - (CONFIRM) https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239 - Third Party Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2957.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-2957.html - Third Party Advisory
First Time Redhat enterprise Linux Server Aus
Oracle solaris
Redhat enterprise Linux Server
Redhat jboss Core Services
Redhat enterprise Linux Eus
Redhat
Redhat enterprise Linux Workstation
Oracle
Redhat enterprise Linux Desktop
Oracle vm Server
CWE CWE-20 CWE-674
CPE cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

Information

Published : 2016-05-17 14:08

Updated : 2024-11-21 02:50


NVD link : CVE-2016-3627

Mitre link : CVE-2016-3627

CVE.ORG link : CVE-2016-3627


JSON object : View

Products Affected

oracle

  • vm_server
  • solaris

redhat

  • jboss_core_services
  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_workstation

hp

  • icewall_federation_agent
  • icewall_file_manager

xmlsoft

  • libxml2

canonical

  • ubuntu_linux

opensuse

  • leap

debian

  • debian_linux
CWE
CWE-674

Uncontrolled Recursion