First published: Thu Jun 29 2017(Updated: )
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libxml-libxml-perl | <=2.0128+dfsg-3<=2.0116+dfsg-1 | 2.0128+dfsg-4 2.0128+dfsg-1+deb9u1 2.0116+dfsg-1+deb8u2 |
debian/libxml-libxml-perl | 2.0134+dfsg-1 2.0134+dfsg-2 2.0207+dfsg+really+2.0134-1 | |
XML-LibXML | <=2.0129 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10672 has been categorized as a high severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2017-10672, upgrade the affected libxml-libxml-perl package to version 2.0130 or later.
CVE-2017-10672 affects versions of the libxml-libxml-perl package prior to 2.0130.
Yes, CVE-2017-10672 can be exploited remotely by attackers through crafted input.
Exploitation of CVE-2017-10672 can lead to arbitrary code execution, compromising the affected system.