#VU109836 Heap-based buffer overflow in Libxml2 - CVE-2016-1840
Published: May 27, 2025
Libxml2
Gnome Development Team
Description
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the xmlFAParsePosCharGroup function in libxml2. A local user can trick the victim into opening a specially crafted XML document, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90691
- http://www.securitytracker.com/id/1035890
- http://www.ubuntu.com/usn/USN-2994-1
- http://xmlsoft.org/news.html
- https://access.redhat.com/errata/RHSA-2016:1292
- https://bugzilla.gnome.org/show_bug.cgi?id=757711
- https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206564
- https://support.apple.com/HT206566
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://www.debian.org/security/2016/dsa-3593
- https://www.tenable.com/security/tns-2016-18