CVE-2017-5969
Gentoo Linux Security Advisory 201711-01
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.
** DISPUTADO ** libxml2 2.9.4, cuando se utiliza en el modo de recuperación, permite a los atacantes remotos provocar una denegación de servicio (referencia de puntero NULL) por medio de un documento XML manipulado. NOTA: El mantenedor declara que "no estaría de acuerdo con un CVE con la opción de análisis de recuperación que sólo debería utilizarse para la recuperación manual al menos para el analizador de XML".
Multiple vulnerabilities have been found in libxml2, the worst of which could result in the execution of arbitrary code. Versions prior to 2.9.4-r3 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-02-12 CVE Reserved
- 2017-04-11 CVE Published
- 2024-08-05 CVE Updated
- 2025-05-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/11/05/3 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2017/02/13/1 | Mailing List |
|
http://www.securityfocus.com/bid/96188 | Third Party Advisory | |
https://bugzilla.gnome.org/show_bug.cgi?id=778519 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201711-01 | 2024-05-17 |