Vulnerability Details : CVE-2016-4483
Potential exploit
The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
Vulnerability category: Denial of service
Products affected by CVE-2016-4483
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-4483
1.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-4483
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-4483
-
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-4483
-
http://www.openwall.com/lists/oss-security/2016/05/03/8
oss-security - CVE request: out-of-bounds read parsing an XML in libxml2 using recover modeExploit;Mailing List;Third Party Advisory
-
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
-
http://www.securitytracker.com/id/1036348
Apple macOS/OS X Multiple Flaws Let Remote and Local Users Deny Service, Obtain Potentially Sensitive Information, and Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Oracle Solaris Bulletin - July 2016Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-2957.html
RHSA-2016:2957 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201701-37
libxml2: Multiple vulnerabilities (GLSA 201701-37) — Gentoo securityThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/07/4
oss-security - Please reject duplicate CVE for libxml2Mailing List;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/05/04/7
oss-security - Re: CVE request: out-of-bounds read parsing an XML in libxml2 using recover modeMailing List;Third Party Advisory
-
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
Avoid an out of bound access when serializing malformed strings (c97750d1) · Commits · GNOME / libxml2 · GitLabPatch;Third Party Advisory
-
https://www.tenable.com/security/tns-2016-18
[R7] LCE 4.8.1 Fixes Multiple Vulnerabilities - Security Advisory | Tenable®Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/06/07/5
oss-security - Re: Please reject duplicate CVE for libxml2Mailing List;Patch;Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3593
Debian -- Security Information -- DSA-3593-1 libxml2Third Party Advisory
-
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
[GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 - Pony Mail
-
http://www.securityfocus.com/bid/90013
Libxml2 'xmlsave.c' Denial of Service VulnerabilityThird Party Advisory;VDB Entry
Jump to