First published: Sun Sep 25 2016(Updated: )
The libxml2 library, as used in multiple products, could allow a remote attacker to execute arbitrary code on the system, caused by a memory corruption error. An attacker could exploit this vulnerability using a specially crafted XML document to execute arbitrary code on the system or cause a denial of service.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Apple iPhone OS | <10.0 | |
Apple Mac OS X | <10.12 | |
Apple tvOS | <10.0 | |
Apple watchOS | <3.0 | |
Xmlsoft Libxml2 | <2.9.5 | |
<=10.5 | ||
<=10.6 | ||
<=11.0 | ||
<=11.1 | ||
<=11.2 | ||
<=11.3 | ||
<=11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4658 is a vulnerability in the libxml2 library that allows a remote attacker to execute arbitrary code or cause a denial of service.
CVE-2016-4658 affects Google Android, Apple iPhone OS (up to version 10.0), Apple Mac OS X (up to version 10.12), Apple tvOS (up to version 10.0), Apple watchOS (up to version 3.0), Xmlsoft Libxml2 (up to version 2.9.5), and IBM Security Guardium (up to version 11.4).
CVE-2016-4658 has a severity rating of 9.8 (Critical).
To fix CVE-2016-4658, users should update to a version of the affected software that includes the necessary patches or security updates.
You can find more information about CVE-2016-4658 on the IBM X-Force Exchange website and the IBM Support website, as well as on the official Android source code repository.