Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU33820
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2014-0191
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform service disruption.
The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU24489
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-19956
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak in xmlParseBalancedChunkMemoryRecover in parser.c. A remote attacker can trigger a memory leak related to newDoc->oldNs and perform denial of service attack.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU24487
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2019-20388
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak in xmlSchemaPreRun in xmlschemas.c. A remote attacker can trigger a xmlSchemaValidateStream memory leak and perform denial of service attack.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU46737
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-24977
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the xmlEncodeEntitiesInternal() function in libxml2/entities.c in libxml2. A remote attacker can pas specially crafted XML data to the affected application, trigger out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU24488
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-7595
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop in xmlStringLenDecodeEntities in parser.c. A remote attacker can consume all available system resources and cause denial of service conditions in a certain end-of-file situation.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54222
Risk: High
CVSSv3.1:
CVE-ID: CVE-2021-3516
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in xmllint. A remote attacker can use a specially crafted file to execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54224
Risk: High
CVSSv3.1:
CVE-ID: CVE-2021-3517
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in the xml entity encoding functionality. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54225
Risk: High
CVSSv3.1:
CVE-ID: CVE-2021-3518
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in libxml2. A remote attacker can use a specially crafted file and execute arbitrary code on the target system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU54223
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-3537
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
MitigationUpdate the affected package libxml2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Point of Sale: 11-SP3
SUSE Linux Enterprise Debuginfo: 11-SP3 - 11-SP4
SUSE Linux Enterprise Server: 11-SP4-LTSS
libxml2-python-debugsource: before 2.7.6-0.77.36.1
libxml2-python-debuginfo: before 2.7.6-0.77.36.1
libxml2-debugsource: before 2.7.6-0.77.36.1
libxml2-debuginfo: before 2.7.6-0.77.36.1
libxml2-32bit: before 2.7.6-0.77.36.1
libxml2-python: before 2.7.6-0.77.36.1
libxml2-doc: before 2.7.6-0.77.36.1
libxml2: before 2.7.6-0.77.36.1
Fixed software versionsCPE2.3 External links
http://www.suse.com/support/update/announcement/2021/suse-su-202114729-1/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?