First published: Mon Mar 21 2016(Updated: )
A vulnerability was found in a way libxml2 parses certain files. With the libxml2 in recovery mode, a maliciously crafted filed could cause libxml2 to crash. References: <a href="http://seclists.org/oss-sec/2016/q1/682">http://seclists.org/oss-sec/2016/q1/682</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q1/683">http://seclists.org/oss-sec/2016/q1/683</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libxml2 | <0:2.7.6-21.el6_8.1 | 0:2.7.6-21.el6_8.1 |
redhat/libxml2 | <0:2.9.1-6.el7_2.3 | 0:2.9.1-6.el7_2.3 |
debian/libxml2 | <=2.9.3+dfsg1-1<=2.8.0+dfsg1-5<=2.8.0+dfsg1-7 | 2.9.3+dfsg1-1.1 2.9.1+dfsg1-5+deb8u2 |
debian/libxml2 | 2.9.4+dfsg1-7+deb10u4 2.9.4+dfsg1-7+deb10u6 2.9.10+dfsg-6.7+deb11u4 2.9.14+dfsg-1.3~deb12u1 2.9.14+dfsg-1.3 | |
SUSE Linux | =42.1 | |
Debian Linux | =8.0 | |
HP IceWall Federation Agent | =3.0 | |
HP Icewall File Manager | =3.0 | |
libxml2-devel | <=2.9.3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Red Hat JBoss Core Services | ||
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.2 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle VM Server | =3.3 | |
Oracle VM Server | =3.4 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3627 is classified as a moderate severity vulnerability.
To fix CVE-2016-3627, update your libxml2 package to a version that includes the security patch.
CVE-2016-3627 affects libxml2 versions prior to 0:2.7.6-21.el6_8.1 and 0:2.9.1-6.el7_2.3, among others.
CVE-2016-3627 can be exploited to cause a denial of service via a crash of the libxml2 parser.
If you cannot update, consider disabling recovery mode in libxml2 to mitigate the risk associated with CVE-2016-3627.