[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110204

 
 

909

 
 

85984

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2016-0718Date: (C)2016-06-02   (M)2018-06-17


Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
SECTRACK-1036348
SECTRACK-1036415
SECTRACK-1037705
http://seclists.org/fulldisclosure/2017/Feb/68
BID-90729
APPLE-SA-2016-07-18-1
DSA-3582
GLSA-201701-21
RHSA-2016:2824
SUSE-SU-2016:1508
SUSE-SU-2016:1512
USN-2983-1
USN-3044-1
http://www.openwall.com/lists/oss-security/2016/05/17/12
http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
http://support.eset.com/ca6333/
http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
https://bugzilla.redhat.com/show_bug.cgi?id=1296102
https://source.android.com/security/bulletin/2016-11-01.html
https://support.apple.com/HT206903
https://www.tenable.com/security/tns-2016-20
openSUSE-SU-2016:1441
openSUSE-SU-2016:1523
openSUSE-SU-2016:1964
openSUSE-SU-2016:2026

CPE    9
cpe:/a:suse:studio_onsite:1.3
cpe:/a:libexpat:expat:-
cpe:/o:novell:leap:42.1
cpe:/o:canonical:ubuntu_linux:15.10
...
CWE    1
CWE-119
OVAL    23
oval:org.secpod.oval:def:34942
oval:org.secpod.oval:def:36289
oval:org.secpod.oval:def:36618
oval:org.secpod.oval:def:36617
...

© SecPod Technologies