Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-10672 (GCVE-0-2017-10672)
Vulnerability from cvelistv5 – Published: 2017-06-29 08:00 – Updated: 2024-08-05 17:41
VLAI?
EPSS
Summary
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Date Public ?
2017-06-28 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:41:55.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-4042",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"name": "[debian-lts-announce] 20171114 [SECURITY] [DLA 1171-1] libxml-libxml-perl security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-06-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-02-02T10:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-4042",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"name": "[debian-lts-announce] 20171114 [SECURITY] [DLA 1171-1] libxml-libxml-perl security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-10672",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4042",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"name": "[debian-lts-announce] 20171114 [SECURITY] [DLA 1171-1] libxml-libxml-perl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=122246",
"refsource": "MISC",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-10672",
"datePublished": "2017-06-29T08:00:00.000Z",
"dateReserved": "2017-06-28T00:00:00.000Z",
"dateUpdated": "2024-08-05T17:41:55.518Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-10672",
"date": "2026-04-20",
"epss": "0.10052",
"percentile": "0.93091"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-10672\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-06-29T08:29:00.263\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.\"},{\"lang\":\"es\",\"value\":\"Uso de memoria previamente liberada en el m\u00f3dulo XML-LibXML hasta la versi\u00f3n 2.0129 para Perl permite que atacantes remotos ejecuten c\u00f3digo arbitrario controlando los argumentos de una llamada replaceChild.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xml-libxml_project:xml-libxml:*:*:*:*:*:perl:*:*\",\"versionEndIncluding\":\"2.0129\",\"matchCriteriaId\":\"6C16CFA0-46C5-4387-ADCD-C1EF21B3526C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rt.cpan.org/Public/Bug/Display.html?id=122246\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-4042\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rt.cpan.org/Public/Bug/Display.html?id=122246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-4042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
FKIE_CVE-2017-10672
Vulnerability from fkie_nvd - Published: 2017-06-29 08:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html | Third Party Advisory | |
| cve@mitre.org | https://rt.cpan.org/Public/Bug/Display.html?id=122246 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2017/dsa-4042 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rt.cpan.org/Public/Bug/Display.html?id=122246 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-4042 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| xml-libxml_project | xml-libxml | * | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xml-libxml_project:xml-libxml:*:*:*:*:*:perl:*:*",
"matchCriteriaId": "6C16CFA0-46C5-4387-ADCD-C1EF21B3526C",
"versionEndIncluding": "2.0129",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call."
},
{
"lang": "es",
"value": "Uso de memoria previamente liberada en el m\u00f3dulo XML-LibXML hasta la versi\u00f3n 2.0129 para Perl permite que atacantes remotos ejecuten c\u00f3digo arbitrario controlando los argumentos de una llamada replaceChild."
}
],
"id": "CVE-2017-10672",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-29T08:29:00.263",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-4042"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
SUSE-SU-2018:0170-1
Vulnerability from csaf_suse - Published: 2018-01-22 10:36 - Updated: 2018-01-22 10:36Summary
Security update for perl-XML-LibXML
Severity
Important
Notes
Title of the patch: Security update for perl-XML-LibXML
Description of the patch: This update for perl-XML-LibXML fixes the following issues:
- CVE-2017-10672: A use-after-free allowed remote attackers to potentially
execute arbitrary code by controlling the arguments to a replaceChild call
(bsc#1046848)
Patchnames: sleposp3-perl-XML-LibXML-13426,slessp3-perl-XML-LibXML-13426,slessp4-perl-XML-LibXML-13426
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for perl-XML-LibXML",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for perl-XML-LibXML fixes the following issues:\n\n- CVE-2017-10672: A use-after-free allowed remote attackers to potentially\n execute arbitrary code by controlling the arguments to a replaceChild call\n (bsc#1046848)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleposp3-perl-XML-LibXML-13426,slessp3-perl-XML-LibXML-13426,slessp4-perl-XML-LibXML-13426",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0170-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0170-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180170-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0170-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003615.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046848",
"url": "https://bugzilla.suse.com/1046848"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10672 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10672/"
}
],
"title": "Security update for perl-XML-LibXML",
"tracking": {
"current_release_date": "2018-01-22T10:36:54Z",
"generator": {
"date": "2018-01-22T10:36:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0170-1",
"initial_release_date": "2018-01-22T10:36:54Z",
"revision_history": [
{
"date": "2018-01-22T10:36:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-1.66-3.3.1.i586",
"product": {
"name": "perl-XML-LibXML-1.66-3.3.1.i586",
"product_id": "perl-XML-LibXML-1.66-3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-1.66-3.3.1.ia64",
"product": {
"name": "perl-XML-LibXML-1.66-3.3.1.ia64",
"product_id": "perl-XML-LibXML-1.66-3.3.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-1.66-3.3.1.ppc64",
"product": {
"name": "perl-XML-LibXML-1.66-3.3.1.ppc64",
"product_id": "perl-XML-LibXML-1.66-3.3.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-1.66-3.3.1.s390x",
"product": {
"name": "perl-XML-LibXML-1.66-3.3.1.s390x",
"product_id": "perl-XML-LibXML-1.66-3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-1.66-3.3.1.x86_64",
"product": {
"name": "perl-XML-LibXML-1.66-3.3.1.x86_64",
"product_id": "perl-XML-LibXML-1.66-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:perl-XML-LibXML-1.66-3.3.1.i586"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.i586"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.s390x"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.x86_64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.i586"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.s390x"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.x86_64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-1.66-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64"
},
"product_reference": "perl-XML-LibXML-1.66-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-10672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10672"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10672",
"url": "https://www.suse.com/security/cve/CVE-2017-10672"
},
{
"category": "external",
"summary": "SUSE Bug 1046848 for CVE-2017-10672",
"url": "https://bugzilla.suse.com/1046848"
},
{
"category": "external",
"summary": "SUSE Bug 1069732 for CVE-2017-10672",
"url": "https://bugzilla.suse.com/1069732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:perl-XML-LibXML-1.66-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-22T10:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-10672"
}
]
}
SUSE-SU-2018:0123-1
Vulnerability from csaf_suse - Published: 2018-01-17 13:42 - Updated: 2018-01-17 13:42Summary
Security update for perl-XML-LibXML
Severity
Moderate
Notes
Title of the patch: Security update for perl-XML-LibXML
Description of the patch: This update for perl-XML-LibXML fixes the following issues:
Security issue fixed:
- CVE-2017-10672: Fix use-after-free that allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848).
Patchnames: SUSE-CAASP-ALL-2018-89,SUSE-SLE-DESKTOP-12-SP2-2018-89,SUSE-SLE-DESKTOP-12-SP3-2018-89,SUSE-SLE-RPI-12-SP2-2018-89,SUSE-SLE-SERVER-12-SP2-2018-89,SUSE-SLE-SERVER-12-SP3-2018-89
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for perl-XML-LibXML",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for perl-XML-LibXML fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2017-10672: Fix use-after-free that allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call (bsc#1046848).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-CAASP-ALL-2018-89,SUSE-SLE-DESKTOP-12-SP2-2018-89,SUSE-SLE-DESKTOP-12-SP3-2018-89,SUSE-SLE-RPI-12-SP2-2018-89,SUSE-SLE-SERVER-12-SP2-2018-89,SUSE-SLE-SERVER-12-SP3-2018-89",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0123-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:0123-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180123-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:0123-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046848",
"url": "https://bugzilla.suse.com/1046848"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10672 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10672/"
}
],
"title": "Security update for perl-XML-LibXML",
"tracking": {
"current_release_date": "2018-01-17T13:42:16Z",
"generator": {
"date": "2018-01-17T13:42:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:0123-1",
"initial_release_date": "2018-01-17T13:42:16Z",
"revision_history": [
{
"date": "2018-01-17T13:42:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"product": {
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"product_id": "perl-XML-LibXML-2.0019-6.3.5.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"product": {
"name": "perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"product_id": "perl-XML-LibXML-2.0019-6.3.5.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-2.0019-6.3.5.s390x",
"product": {
"name": "perl-XML-LibXML-2.0019-6.3.5.s390x",
"product_id": "perl-XML-LibXML-2.0019-6.3.5.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"product": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"product_id": "perl-XML-LibXML-2.0019-6.3.5.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-XML-LibXML-2.0019-6.3.5.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64"
},
"product_reference": "perl-XML-LibXML-2.0019-6.3.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-10672",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10672"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10672",
"url": "https://www.suse.com/security/cve/CVE-2017-10672"
},
{
"category": "external",
"summary": "SUSE Bug 1046848 for CVE-2017-10672",
"url": "https://bugzilla.suse.com/1046848"
},
{
"category": "external",
"summary": "SUSE Bug 1069732 for CVE-2017-10672",
"url": "https://bugzilla.suse.com/1069732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:perl-XML-LibXML-2.0019-6.3.5.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:perl-XML-LibXML-2.0019-6.3.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-01-17T13:42:16Z",
"details": "moderate"
}
],
"title": "CVE-2017-10672"
}
]
}
GSD-2017-10672
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-10672",
"description": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.",
"id": "GSD-2017-10672",
"references": [
"https://www.suse.com/security/cve/CVE-2017-10672.html",
"https://www.debian.org/security/2017/dsa-4042",
"https://ubuntu.com/security/CVE-2017-10672",
"https://advisories.mageia.org/CVE-2017-10672.html",
"https://security.archlinux.org/CVE-2017-10672"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-10672"
],
"details": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.",
"id": "GSD-2017-10672",
"modified": "2023-12-13T01:21:14.639545Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-10672",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4042",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"name": "[debian-lts-announce] 20171114 [SECURITY] [DLA 1171-1] libxml-libxml-perl security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=122246",
"refsource": "MISC",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xml-libxml_project:xml-libxml:*:*:*:*:*:perl:*:*",
"cpe_name": [],
"versionEndIncluding": "2.0129",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-10672"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://rt.cpan.org/Public/Bug/Display.html?id=122246",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
},
{
"name": "DSA-4042",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"name": "[debian-lts-announce] 20171114 [SECURITY] [DLA 1171-1] libxml-libxml-perl security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-03-03T16:19Z",
"publishedDate": "2017-06-29T08:29Z"
}
}
}
WID-SEC-W-2025-0268
Vulnerability from csaf_certbund - Published: 2017-11-19 23:00 - Updated: 2025-02-04 23:00Summary
Perl: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Perl ist eine freie, plattformunabhängige und interpretierte Programmiersprache (Skriptsprache).
Angriff: Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Perl ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen.
Betroffene Betriebssysteme: - Linux
Es existiert eine use-after-free Schwachstelle in Perl im "XML-LibXML" Modul in der Funktion "XML::LibXML::Node::replaceChild". Ein Angreifer kann durch Kontrolle der Argumente eines "replaceChild" Aufrufs beliebigen Code ausführen.
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Perl ist eine freie, plattformunabh\u00e4ngige und interpretierte Programmiersprache (Skriptsprache).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Perl ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0268 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2025-0268.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0268 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0268"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4042 vom 2017-11-19",
"url": "https://www.debian.org/security/2017/dsa-4042"
},
{
"category": "external",
"summary": "Bug #122246 for XML-LibXML",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-3494-1 vom 2017-11-28",
"url": "http://www.ubuntu.com/usn/usn-3494-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0123-1 vom 2018-01-17",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180123-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:0170-1 vom 2018-01-22",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180170-1.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-071 vom 2025-02-05",
"url": "https://www.dell.com/support/kbdoc/de-de/000281275/dsa-2025-071-security-update-for-dell-avamar-for-multiple-component-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "Perl: Schwachstelle erm\u00f6glicht Ausf\u00fchren von beliebigem Programmcode mit Administratorrechten",
"tracking": {
"current_release_date": "2025-02-04T23:00:00.000+00:00",
"generator": {
"date": "2025-02-05T11:40:36.469+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0268",
"initial_release_date": "2017-11-19T23:00:00.000+00:00",
"revision_history": [
{
"date": "2017-11-19T23:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2017-11-19T23:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-11-27T23:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2018-01-17T23:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-01-22T23:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.12",
"product": {
"name": "Dell Avamar \u003c19.12",
"product_id": "T040818"
}
},
{
"category": "product_version",
"name": "19.12",
"product": {
"name": "Dell Avamar 19.12",
"product_id": "T040818-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:19.12"
}
}
}
],
"category": "product_name",
"name": "Avamar"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Perl",
"product": {
"name": "Open Source Perl",
"product_id": "T002190",
"product_identification_helper": {
"cpe": "cpe:/a:perl:perl:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-10672",
"notes": [
{
"category": "description",
"text": "Es existiert eine use-after-free Schwachstelle in Perl im \"XML-LibXML\" Modul in der Funktion \"XML::LibXML::Node::replaceChild\". Ein Angreifer kann durch Kontrolle der Argumente eines \"replaceChild\" Aufrufs beliebigen Code ausf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T040818",
"T002207",
"T002190",
"T000126"
]
},
"release_date": "2017-11-19T23:00:00.000+00:00",
"title": "CVE-2017-10672"
}
]
}
CNVD-2017-16006
Vulnerability from cnvd - Published: 2017-07-24
VLAI Severity ?
Title
Perl XML-LibXML模块任意代码执行漏洞
Description
Perl是美国程序员拉里-沃尔(Larry Wall)所研发的一种的跨平台编程语言。XML-LibXML是其中的一个基于Debian中的XML文件转换模块。
Perl的XML-LibXML模块(<=2.0129)存在任意代码执行漏洞,远程攻击者可利用该漏洞通过控制replaceChild调用的参数来执行任意代码。
Severity
高
Formal description
厂商尚未提供漏洞修复方案,请关注厂商主页更新: https://www.perl.org/
Reference
https://rt.cpan.org/Public/Bug/Display.html?id=122246
https://nvd.nist.gov/vuln/detail/CVE-2017-10672?cpeVersion=2.2#vulnConfigurationsArea
Impacted products
| Name | Perl XML-LibXML <=2.0129 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-10672"
}
},
"description": "Perl\u662f\u7f8e\u56fd\u7a0b\u5e8f\u5458\u62c9\u91cc-\u6c83\u5c14\uff08Larry Wall\uff09\u6240\u7814\u53d1\u7684\u4e00\u79cd\u7684\u8de8\u5e73\u53f0\u7f16\u7a0b\u8bed\u8a00\u3002XML-LibXML\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u57fa\u4e8eDebian\u4e2d\u7684XML\u6587\u4ef6\u8f6c\u6362\u6a21\u5757\u3002\r\n\r\nPerl\u7684XML-LibXML\u6a21\u5757\uff08\u003c=2.0129\uff09\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u63a7\u5236replaceChild\u8c03\u7528\u7684\u53c2\u6570\u6765\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "unknown",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttps://www.perl.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-16006",
"openTime": "2017-07-24",
"products": {
"product": "Perl XML-LibXML \u003c=2.0129"
},
"referenceLink": "https://rt.cpan.org/Public/Bug/Display.html?id=122246\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-10672?cpeVersion=2.2#vulnConfigurationsArea",
"serverity": "\u9ad8",
"submitTime": "2017-06-29",
"title": "Perl XML-LibXML\u6a21\u5757\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
GHSA-V3C8-H936-VQGH
Vulnerability from github – Published: 2022-05-13 01:28 – Updated: 2022-05-13 01:28
VLAI?
Details
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
Severity ?
9.8 (Critical)
{
"affected": [],
"aliases": [
"CVE-2017-10672"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-06-29T08:29:00Z",
"severity": "CRITICAL"
},
"details": "Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.",
"id": "GHSA-v3c8-h936-vqgh",
"modified": "2022-05-13T01:28:01Z",
"published": "2022-05-13T01:28:01Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10672"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"
},
{
"type": "WEB",
"url": "https://rt.cpan.org/Public/Bug/Display.html?id=122246"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2017/dsa-4042"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…