CVE-2017-7375
Severity CVSS v4.0:
Pending analysis
Type:
CWE-611
Improper Restriction of XML External Entity Reference ('XXE')
Publication date:
19/02/2018
Last modified:
18/03/2018
Description
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* | 2.9.4 (including) | |
| cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxml2:2.9.4:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:xmlsoft:libxml2:2.9.4:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/98877
- http://www.securitytracker.com/id/1038623
- https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
- https://bugzilla.redhat.com/show_bug.cgi?id=1462203
- https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
- https://security.gentoo.org/glsa/201711-01
- https://source.android.com/security/bulletin/2017-06-01
- https://www.debian.org/security/2017/dsa-3952



