hshivhare67 / platform_external_libxml2_android-4.2.2_r1

Other
0 stars 0 forks source link

CVE-2016-1834 (Medium) detected in https://source.codeaurora.org/external/simcom/platform/external/libxml2/M8930AAAAANLYA2214013 - autoclosed #18

Closed mend-bolt-for-github[bot] closed 9 months ago

mend-bolt-for-github[bot] commented 9 months ago

CVE-2016-1834 - Medium Severity Vulnerability

Vulnerable Library - https://source.codeaurora.org/external/simcom/platform/external/libxml2/M8930AAAAANLYA2214013

Library home page: https://source.codeaurora.org/external/simcom/platform/external/libxml2/

Found in HEAD commit: 12b9a2156a638c2c012da785da0bc6105b0f5579

Found in base branch: main

Vulnerable Source Files (1)

/xmlstring.c

Vulnerability Details

Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.

Publish Date: 2016-05-20

URL: CVE-2016-1834

CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704

Release Date: 2016-05-20

Fix Resolution: v2.9.4


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 9 months ago

:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #19

mend-bolt-for-github[bot] commented 9 months ago

:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #19