Your submission was sent successfully! Close

CVE-2016-3705

Published: 17 May 2016

The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
libxml2
Launchpad, Ubuntu, Debian
precise
Released (2.7.8.dfsg-5.1ubuntu4.15)
trusty
Released (2.9.1+dfsg1-3ubuntu4.8)
upstream
Released (2.9.4)
wily
Released (2.9.2+zdfsg1-4ubuntu0.4)
xenial
Released (2.9.3+dfsg1-1ubuntu0.1)
yakkety Not vulnerable
(2.9.3+dfsg1-1.2)
zesty Not vulnerable
(2.9.3+dfsg1-1.2)
Patches:
upstream: https://git.gnome.org/browse/libxml2/commit/?id=8f30bdff69edac9075f4663ce3b56b0c52d48ce6