First published: Mon Jun 05 2017(Updated: )
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Credit: an anonymous researcher cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libxml2 | 2.9.4+dfsg1-7+deb10u4 2.9.4+dfsg1-7+deb10u6 2.9.10+dfsg-6.7+deb11u4 2.9.14+dfsg-1.3~deb12u1 2.9.14+dfsg-1.3 | |
redhat/libxml2 | <2.9.5 | 2.9.5 |
tvOS | <11 | 11 |
macOS High Sierra | <10.13 | 10.13 |
macOS High Sierra | <10.13.1 | 10.13.1 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <11 | 11 |
Apple iOS, iPadOS, and watchOS | <4 | 4 |
Apple iCloud | <7.0 | 7.0 |
Android | ||
libxml2-devel | <2.9.5 | |
Android | =4.4.4 | |
Android | =5.0.2 | |
Android | =5.1.1 | |
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | =7.1.1 | |
Android | =7.1.2 | |
Debian | =8.0 | |
Debian | =9.0 | |
iTunes | <12.7 | 12.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2017-7376 is a buffer overflow vulnerability in libxml2 that allows remote attackers to execute arbitrary code.
CVE-2017-7376 has a severity rating of 9.8, which is classified as critical.
CVE-2017-7376 affects libxml2 versions up to but not including 2.9.5.
To fix CVE-2017-7376, update to libxml2 version 2.9.5 or later.
You can find more information about CVE-2017-7376 at the following references: [link1](https://support.apple.com/en-us/HT208113), [link2](https://bugzilla.gnome.org/show_bug.cgi?id=780690), [link3](https://security-tracker.debian.org/tracker/CVE-2017-7376).