Buffer overflow in Libxml2 - CVE-2017-16931

 

Buffer overflow in Libxml2 - CVE-2017-16931

Published: November 23, 2017 / Updated: July 28, 2020


Vulnerability identifier: #VU32048
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2017-16931
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Gnome Development Team
Affected software:
Libxml2

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a '%' character in a DTD name.


How to mitigate CVE-2017-16931

Install update from vendor's website.

Sources