CVE-2016-0718

CVSS V2 High 7.5 CVSS V3 Critical 9.8
Description
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Overview
  • CVE ID
  • CVE-2016-0718
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2016-05-26T16:59:00
  • Last Modified Date
  • 2023-02-12T23:15:50
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 48.0
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR 10.11.0 10.11.5
cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:* 1 OR
cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:* 1 OR 2.2.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:* 1 OR 6.5.1
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 2.7.0 2.7.15
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.3.0 3.3.7
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.4.0 3.4.7
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.5.0 3.5.4
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* 1 OR 3.6.0 3.6.2
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html Third Party Advisory
http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2824.html Third Party Advisory
http://seclists.org/fulldisclosure/2017/Feb/68 Mailing List Third Party Advisory
http://support.eset.com/ca6333/ Third Party Advisory
http://www.debian.org/security/2016/dsa-3582 Third Party Advisory
http://www.mozilla.org/security/announce/2016/mfsa2016-68.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/17/12 Mailing List Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html Patch Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html Third Party Advisory
http://www.securityfocus.com/bid/90729 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036348 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036415 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1037705 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2983-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-3044-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:2824
https://access.redhat.com/errata/RHSA-2018:2486 Third Party Advisory
https://access.redhat.com/security/cve/CVE-2016-0718
https://bugzilla.mozilla.org/show_bug.cgi?id=1236923 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1296102 Issue Tracking Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10365 Third Party Advisory
https://security.gentoo.org/glsa/201701-21 Third Party Advisory
https://source.android.com/security/bulletin/2016-11-01.html Third Party Advisory
https://support.apple.com/HT206903 Third Party Advisory
https://www.tenable.com/security/tns-2016-20 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:58:52 Added to TrackCVE
2022-12-02 09:41:56 2016-05-26T16:59Z 2016-05-26T16:59:00 CVE Published Date updated
2022-12-02 09:41:56 2022-06-27T17:05:27 CVE Modified Date updated
2022-12-02 09:41:56 Analyzed Vulnerability Status updated
2023-02-02 22:06:12 2023-02-02T21:16:15 CVE Modified Date updated
2023-02-02 22:06:12 Analyzed Modified Vulnerability Status updated
2023-02-02 22:06:13 Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. Description updated
2023-02-02 22:06:18 References updated
2023-02-13 00:05:45 2023-02-12T23:15:50 CVE Modified Date updated
2023-02-13 00:05:45 An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. Description updated