First published: Tue May 03 2016(Updated: )
It is possible to trigger a stack overflow using a carefully crafted invalid xml file, the stack overflow occurs before libxml2 determines the xml file is invalid. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=765207">https://bugzilla.gnome.org/show_bug.cgi?id=765207</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libxml2 | <0:2.7.6-21.el6_8.1 | 0:2.7.6-21.el6_8.1 |
redhat/libxml2 | <0:2.9.1-6.el7_2.3 | 0:2.9.1-6.el7_2.3 |
debian/libxml2 | 2.9.4+dfsg1-7+deb10u4 2.9.4+dfsg1-7+deb10u6 2.9.10+dfsg-6.7+deb11u4 2.9.14+dfsg-1.3~deb12u1 2.9.14+dfsg-1.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
Gnome Libxml2 | =2.9.3 | |
Debian Debian Linux | =8.0 | |
HP IceWall Federation Agent | =3.0 | |
HP Icewall File Manager | =3.0 | |
openSUSE | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3705 is classified as a high-severity vulnerability due to its potential for causing a stack overflow.
To mitigate CVE-2016-3705, update libxml2 to the recommended versions: 0:2.7.6-21.el6_8.1 for RedHat or 2.9.4+dfsg1-7+deb10u4 for Debian.
CVE-2016-3705 affects various versions of libxml2 across different operating systems including RedHat, Debian, and Ubuntu.
CVE-2016-3705 allows attackers to exploit a stack overflow by using a specially crafted invalid XML file.
CVE-2016-3705 was first reported in 2016, highlighting the vulnerabilities in libxml2.