SB2018012427 - Fedora 27 update for libxml2
Published: January 24, 2018 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2016-5131)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing vectors related to the XPointer range-to function. A remote attackers can cause a denial of service or execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Use-after-free (CVE-ID: CVE-2016-4658)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error, caused by using namespace nodes in XPointer ranges within the xpointer.c in libxml2. A remote attackers can pass specially crated XML document to he application, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Buffer over-read (CVE-ID: CVE-2017-8872)
The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition on the target system.The weakness exists in the htmlParseTryOrFinish function of XMLSoft libxml2 due to buffer over-read condition in the HTMLparser.c source code. A remote attacker can send a specially crafted XML file, trick the victim into opening it and read arbitrary data or cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
4) Memory corruption (CVE-ID: CVE-2017-9047)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the xmlSnprintfElementContent function of XMLSoft libxml2 due to improper memory handling by the valid.c source code. A remote attacker can send a specially crafted XML file, trigger memory corruption and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
5) Stack-based buffer overflow (CVE-ID: CVE-2017-9048)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the xmlSnprintfElementContent function of XMLSoft libxml2 due to improper bounds checking in the valid.c code. A remote attacker can send a specially crafted request, trigger stack-based buffer overflow condition and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
6) Heap-based buffer over-read (CVE-ID: CVE-2017-9049)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the xmlDictComputeFastKey function of XMLSoft libxml2 due to improper bounds checking in the dict.c code. A remote attacker can send a specially crafted request, trigger heap-based buffer over-read condition and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
7) Heap-based buffer over-read (CVE-ID: CVE-2017-9050)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the xmlDictAddString function of XMLSoft libxml2 due to improper bounds checking in the dict.c code. A remote attacker can send a specially crafted request, trigger heap-based buffer over-read condition and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.