SB2016052009 - Buffer overflow in libxml2
Published: May 20, 2016 Updated: May 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2016-1834)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to heap-based buffer overflow in the xmlStrncat function in libxml2. A local user can trick the victim into opening a specially crafted file to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
Remediation
Install update from vendor's website.
References
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90691
- http://www.securitytracker.com/id/1035890
- http://www.ubuntu.com/usn/USN-2994-1
- http://xmlsoft.org/news.html
- https://access.redhat.com/errata/RHSA-2016:1292
- https://bugzilla.gnome.org/show_bug.cgi?id=763071
- https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://support.apple.com/HT206564
- https://support.apple.com/HT206566
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://www.debian.org/security/2016/dsa-3593
- https://www.tenable.com/security/tns-2016-18