CVE-2017-5969
Published: 11 April 2017
** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
Notes
Author | Note |
---|---|
mdeslaur | issue in recovery mode only, we will not be fixing this in stable releases |
Priority
Status
Package | Release | Status |
---|---|---|
libxml2 Launchpad, Ubuntu, Debian |
artful |
Ignored
|
precise |
Ignored
(end of life)
|
|
trusty |
Ignored
|
|
upstream |
Released
(2.9.4+dfsg1-5.1, 2.9.5)
|
|
xenial |
Ignored
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
Patches: upstream: https://git.gnome.org/browse/libxml2/commit/?id=94691dc884d1a8ada39f073408b4bb92fe7fe882 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.7 |
Attack vector | Local |
Attack complexity | High |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H |