CVE-2016-0718

Published on: 05/26/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:14 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Mac Os X from Apple contain the following vulnerability:

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.

  • CVE-2016-0718 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Out-of-bounds read during XML parsing in Expat library — Mozilla Third Party Advisory
www.mozilla.org
text/html
URL Logo CONFIRM www.mozilla.org/security/announce/2016/mfsa2016-68.html
IBM Security Network Protection Buffer Overflow in Expat Library Lets Remote Users Execute Arbitrary Code - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1037705
About the security content of OS X El Capitan v10.11.6 and Security Update 2016-004 - Apple Support Third Party Advisory
support.apple.com
text/html
URL Logo CONFIRM support.apple.com/HT206903
[security-announce] SUSE-SU-2016:1508-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1508
Apple macOS/OS X Multiple Flaws Let Remote and Local Users Deny Service, Obtain Potentially Sensitive Information, and Execute Arbitrary Code - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036348
Debian -- Security Information -- DSA-3582-1 expat Third Party Advisory
www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3582
[security-announce] openSUSE-SU-2016:1964-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1964
APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004 Mailing List
Third Party Advisory
lists.apple.com
text/html
URL Logo APPLE APPLE-SA-2016-07-18-1
[security-announce] openSUSE-SU-2016:1523-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1523
[security-announce] openSUSE-SU-2016:2026-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:2026
Android Security Bulletin—November 2016 | Android Open Source Project Third Party Advisory
source.android.com
text/html
URL Logo CONFIRM source.android.com/security/bulletin/2016-11-01.html
oss-security - CVE-2016-0718: Expat XML Parser Crashes on Malformed Input Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input
1236923 - (CVE-2016-0718) Heap read out-of-bound and crash in expat 2.1.0 Issue Tracking
Third Party Advisory
bugzilla.mozilla.org
text/html
URL Logo CONFIRM bugzilla.mozilla.org/show_bug.cgi?id=1236923
CPU July 2018 Patch
Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Expat: Multiple vulnerabilities (GLSA 201701-21) — Gentoo Security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-21
USN-2983-1: Expat vulnerability | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-2983-1
[security-announce] SUSE-SU-2016:1512-1: important: Security update for Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1512
Full Disclosure: CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6 Mailing List
Third Party Advisory
seclists.org
text/html
URL Logo FULLDISC 20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6
USN-3044-1: Firefox vulnerabilities | Ubuntu Third Party Advisory
www.ubuntu.com
text/html
URL Logo UBUNTU USN-3044-1
Red Hat Customer Portal Third Party Advisory
access.redhat.com
text/html
URL Logo REDHAT RHSA-2018:2486
ESET Endpoint Antivirus 6 Remote Code Execution ≈ Packet Storm Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
Tenable Nessus Buffer Overflow in Expat Library Lets Remote Authenticated Users Execute Arbitrary Code - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036415
Bug 1296102 – CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash Issue Tracking
Third Party Advisory
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1296102
Expat CVE-2016-0718 Buffer Overflow Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 90729
[R2] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities - Security Advisory | Tenable Network Security Third Party Advisory
www.tenable.com
text/html
URL Logo CONFIRM www.tenable.com/security/tns-2016-20
Red Hat Customer Portal Third Party Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2824
[security-announce] openSUSE-SU-2016:1441-1: important: Security update Third Party Advisory
lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1441
Remote execution and privilege escalation vulnerabilities in ESET products for macOS fixed—ESET Knowledgebase Third Party Advisory
support.eset.com
text/html
URL Logo CONFIRM support.eset.com/ca6333/
Oracle Solaris Bulletin - July 2016 Third Party Advisory
www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
AppleMac Os XAllAllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
CanonicalUbuntu Linux12.04AllAllAll
Operating
System
CanonicalUbuntu Linux14.04AllAllAll
Operating
System
CanonicalUbuntu Linux16.04AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationLibexpat ProjectLibexpatAllAllAllAll
ApplicationLibexpat ProjectLibexpatAllAllAllAll
ApplicationMozillaFirefoxAllAllAllAll
ApplicationMozillaFirefoxAllAllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
ApplicationSuseLinux Enterprise Debuginfo11sp4AllAll
ApplicationSuseLinux Enterprise Debuginfo11sp4AllAll
Operating
System
SuseLinux Enterprise Desktop12AllAllAll
Operating
System
SuseLinux Enterprise Desktop12.0sp1AllAll
Operating
System
SuseLinux Enterprise Desktop12AllAllAll
Operating
System
SuseLinux Enterprise Desktop12.0sp1AllAll
Operating
System
SuseLinux Enterprise Server11sp4AllAll
Operating
System
SuseLinux Enterprise Server12AllAllAll
Operating
System
SuseLinux Enterprise Server12.0sp1AllAll
Operating
System
SuseLinux Enterprise Server11sp4AllAll
Operating
System
SuseLinux Enterprise Server12AllAllAll
Operating
System
SuseLinux Enterprise Server12.0sp1AllAll
Operating
System
SuseLinux Enterprise Software Development Kit11sp4AllAll
Operating
System
SuseLinux Enterprise Software Development Kit12AllAllAll
Operating
System
SuseLinux Enterprise Software Development Kit12.0sp1AllAll
Operating
System
SuseLinux Enterprise Software Development Kit11sp4AllAll
Operating
System
SuseLinux Enterprise Software Development Kit12AllAllAll
Operating
System
SuseLinux Enterprise Software Development Kit12.0sp1AllAll
ApplicationSuseStudio Onsite1.3AllAllAll
ApplicationSuseStudio Onsite1.3AllAllAll
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_server:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*:
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*:
  • cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*: