CVE-2016-4448

Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
References
Link Resource
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html Mailing List Release Notes
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html Mailing List Release Notes
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html Mailing List Release Notes
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html Mailing List Release Notes
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html Mailing List Release Notes
http://rhn.redhat.com/errata/RHSA-2016-2957.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/05/25/2 Mailing List Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Vendor Advisory
http://www.securityfocus.com/bid/90856 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036348 Third Party Advisory VDB Entry
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722 Third Party Advisory
http://xmlsoft.org/news.html Release Notes
https://access.redhat.com/errata/RHSA-2016:1292 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1338700 Issue Tracking Third Party Advisory
https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9 Vendor Advisory
https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 Third Party Advisory
https://support.apple.com/HT206899 Release Notes
https://support.apple.com/HT206901 Release Notes
https://support.apple.com/HT206902 Release Notes
https://support.apple.com/HT206903 Release Notes
https://support.apple.com/HT206904 Release Notes
https://support.apple.com/HT206905 Release Notes
https://www.tenable.com/security/tns-2016-18 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*
cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*

Configuration 10 (hide)

OR cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*
cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*

Configuration 11 (hide)

cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*

Configuration 12 (hide)

cpe:2.3:a:tenable:log_correlation_engine:4.8.0:*:*:*:*:*:*:*

Configuration 13 (hide)

OR cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*

Configuration 14 (hide)

OR cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*

History

12 Feb 2023, 23:21

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2016-4448', 'name': 'https://access.redhat.com/security/cve/CVE-2016-4448', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2016:2957', 'name': 'https://access.redhat.com/errata/RHSA-2016:2957', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2016-4448 libxml2: Format string vulnerability Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.

02 Feb 2023, 21:16

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2016-4448 -
  • (MISC) https://access.redhat.com/errata/RHSA-2016:2957 -
Summary Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors. CVE-2016-4448 libxml2: Format string vulnerability

Information

Published : 2016-06-09 16:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-4448

Mitre link : CVE-2016-4448

CVE.ORG link : CVE-2016-4448


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server_eus
  • enterprise_linux_workstation
  • enterprise_linux
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • enterprise_linux_server

mcafee

  • web_gateway

apple

  • mac_os_x
  • icloud
  • watchos
  • itunes
  • tvos
  • iphone_os

oracle

  • vm_server
  • linux

xmlsoft

  • libxml2

tenable

  • log_correlation_engine

slackware

  • slackware_linux

hp

  • icewall_federation_agent

microsoft

  • windows
CWE
CWE-134

Use of Externally-Controlled Format String