{ "id": "CVE-2017-5969", "sourceIdentifier": "cve@mitre.org", "published": "2017-04-11T16:59:00.343", "lastModified": "2022-04-08T23:15:09.107", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states \"I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.\"" }, { "lang": "es", "value": "** DISPUTADO ** libxml2 2.9.4, cuando se utiliza en el modo de recuperaci\u00f3n, permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (referencia de puntero NULL) por medio de un documento XML manipulado. NOTA: El mantenedor declara que \"no estar\u00eda de acuerdo con un CVE con la opci\u00f3n de an\u00e1lisis de recuperaci\u00f3n que s\u00f3lo deber\u00eda utilizarse para la recuperaci\u00f3n manual al menos para el analizador de XML\"." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.0, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6 }, "baseSeverity": "LOW", "exploitabilityScore": 4.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-476" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:xmlsoft:libxml2:2.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "430C1FDF-1239-4FF2-B5A4-8CED209B8036" } ] } ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2016/11/05/3", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2017/02/13/1", "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "http://www.securityfocus.com/bid/96188", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://bugzilla.gnome.org/show_bug.cgi?id=778519", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html", "source": "cve@mitre.org" }, { "url": "https://security.gentoo.org/glsa/201711-01", "source": "cve@mitre.org" } ] }