CVE-2016-4472
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
30/06/2016
Last modified:
12/04/2025
Description
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:* | 2.1.1 (including) | |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* | ||
cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:* | 6.5.1 (excluding) | |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 2.7.0 (including) | 2.7.15 (excluding) |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.3.0 (including) | 3.3.7 (excluding) |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.4.0 (including) | 3.4.7 (excluding) |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.5.0 (including) | 3.5.4 (excluding) |
cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.6.0 (including) | 3.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20