CVE-2016-9596

libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1408302 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1408302 - Issue Tracking

07 Nov 2023, 02:37

Type Values Removed Values Added
Summary libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627. libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.

Information

Published : 2018-08-16 20:29

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9596

Mitre link : CVE-2016-9596

CVE.ORG link : CVE-2016-9596


JSON object : View

Products Affected

xmlsoft

  • libxml2

redhat

  • jboss_core_services
CWE
CWE-400

Uncontrolled Resource Consumption