First published: Tue Apr 11 2017(Updated: )
** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
Credit: cve@mitre.org Gustavo Grieco cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xmlsoft Libxml2 | =2.9.4 | |
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan | ||
=2.9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5969 is a vulnerability in libxml2 2.9.4 that allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document.
CVE-2017-5969 affects Apple macOS High Sierra 10.13.1, Apple Sierra, Apple El Capitan, and Xmlsoft Libxml2 2.9.4.
The severity of CVE-2017-5969 is medium with a CVSS score of 4.7.
To fix the CVE-2017-5969 vulnerability, update Apple macOS High Sierra to version 10.13.2 or higher.
More information about CVE-2017-5969 can be found at the following references: [link1], [link2], [link3].