Vulnerability Description
libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xmlsoft | Libxml2 | 2.9.4 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/11/05/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/13/1Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/96188Third Party AdvisoryVDB Entry
- https://bugzilla.gnome.org/show_bug.cgi?id=778519Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
- https://security.gentoo.org/glsa/201711-01
- http://www.openwall.com/lists/oss-security/2016/11/05/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/13/1Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/96188Third Party AdvisoryVDB Entry
- https://bugzilla.gnome.org/show_bug.cgi?id=778519Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
- https://security.gentoo.org/glsa/201711-01
FAQ
What is CVE-2017-5969?
CVE-2017-5969 is a vulnerability with a CVSS score of 4.7 (MEDIUM). libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of ...
How severe is CVE-2017-5969?
CVE-2017-5969 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5969?
Check the references section above for vendor advisories and patch information. Affected products include: Xmlsoft Libxml2.