Vulnerability Change Records for CVE-2016-1839

Change History

CVE Modified by Source 9/27/2016 10:0:17 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

Modified Analysis 3/25/2019 1:27:11 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from (including) 7.5.0.0 up to (including) 7.5.2.10
     *cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:* versions from (including) 7.6.0.0 up to (including) 7.6.2.3
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:* versions up to (excluding) 2.9.4
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (including) 9.3.1
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to (including) 10.11.4
     *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (including) 9.2
     *cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* versions up to (including) 2.2
OR
     *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 9.3.2
     *cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to (excluding) 10.11.5
     *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions up to (excluding) 9.2.1
     *cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* versions up to (excluding) 2.2.1
Changed CVSS V2
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Changed CVSS V3
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
CWE-125
Removed CWE
CWE-119

								
						
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html Mailing List, Vendor Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html Mailing List, Vendor Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html Mailing List, Vendor Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html Mailing List, Vendor Advisory
Changed Reference Type
http://rhn.redhat.com/errata/RHSA-2016-2957.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2016-2957.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/90691 No Types Assigned
http://www.securityfocus.com/bid/90691 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1035890 No Types Assigned
http://www.securitytracker.com/id/1035890 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1038623 No Types Assigned
http://www.securitytracker.com/id/1038623 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/USN-2994-1 No Types Assigned
http://www.ubuntu.com/usn/USN-2994-1 Third Party Advisory
Changed Reference Type
http://xmlsoft.org/news.html No Types Assigned
http://xmlsoft.org/news.html Release Notes, Vendor Advisory
Changed Reference Type
https://access.redhat.com/errata/RHSA-2016:1292 No Types Assigned
https://access.redhat.com/errata/RHSA-2016:1292 Third Party Advisory
Changed Reference Type
https://bugzilla.gnome.org/show_bug.cgi?id=758605 No Types Assigned
https://bugzilla.gnome.org/show_bug.cgi?id=758605 Exploit, Issue Tracking, Third Party Advisory
Changed Reference Type
https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33 No Types Assigned
https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33 Patch, Third Party Advisory
Changed Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 Patch, Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/201701-37 No Types Assigned
https://security.gentoo.org/glsa/201701-37 Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2016/dsa-3593 No Types Assigned
https://www.debian.org/security/2016/dsa-3593 Third Party Advisory
Changed Reference Type
https://www.tenable.com/security/tns-2016-18 No Types Assigned
https://www.tenable.com/security/tns-2016-18 Third Party Advisory

CPE Deprecation Remap 3/08/2019 11:6:37 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:o:apple:apple_tv:*:*:*:*:*:*:*:* versions from (including) 9.2
OR
     *cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* versions from (including) 9.2

CVE Modified by Apple Inc. 11/29/2017 9:29:02 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securityfocus.com/bid/90691 [No Types Assigned]

CVE Modified by Apple Inc. 7/07/2017 9:29:01 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1038623 [No Types Assigned]

CVE Modified by Source 6/10/2016 10:1:17 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.ubuntu.com/usn/USN-2994-1
Added Reference

								
							
							
						
https://www.debian.org/security/2016/dsa-3593

CVE Modified by Source 7/27/2016 10:0:51 PM

Action Type Old Value New Value
Changed Description
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document, a different vulnerability than CVE-2016-1833, CVE-2016-1834, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, and CVE-2016-1840.
The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
Added Reference

								
							
							
						
http://xmlsoft.org/news.html
Added Reference

								
							
							
						
https://bugzilla.gnome.org/show_bug.cgi?id=758605
Added Reference

								
							
							
						
https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33

CVE Translated 7/31/2016 5:45:01 AM

Action Type Old Value New Value
Added Translation

								
							
							
						
La función xmlDictAddString en libxml2 en versiones anteriores a 2.9.4, como se utiliza en Apple iOS en versiones anteriores a 9.3.2, OS X en versiones anteriores a 10.11.5, tvOS en versiones anteriores a 9.2.1 y watchOS en versiones anteriores a 2.2.1, permite a atacantes remotos provocar una denegación de servicio (sobre lectura de buffer basado en memoria dinámica) a través de un documento XML manipulado.
Removed Translation
libxml2, como se utiliza en Apple iOS en versiones anteriores a 9.3.2, OS X en versiones anteriores a 10.11.5, tvOS en versiones anteriores a 9.2.1 y watchOS en versiones anteriores a 2.2.1, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un documento XML manipulado, una vulnerabilidad diferente a CVE-2016-1833, CVE-2016-1834, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838 y CVE-2016-1840.

								
						

CVE Modified by Apple Inc. 11/30/2016 10:7:01 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1035890 [No Types Assigned]

Initial CVE Analysis 5/20/2016 12:11:02 PM

Action Type Old Value New Value

CVE Modified by Apple Inc. 6/30/2017 9:29:36 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://security.gentoo.org/glsa/201701-37 [No Types Assigned]

CVE Modified by Source 9/22/2016 9:59:34 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html

CVE Modified by Apple Inc. 2/28/2017 9:59:01 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.tenable.com/security/tns-2016-18 [No Types Assigned]

CVE Modified by Apple Inc. 1/04/2018 9:30:35 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://rhn.redhat.com/errata/RHSA-2016-2957.html [No Types Assigned]

CVE Modified by Apple Inc. 12/27/2016 9:59:28 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 [No Types Assigned]

Modified Analysis 5/20/2016 2:51:27 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
Configuration 1
     OR
          *cpe:2.3:o:apple:mac_os_x:10.11.4:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:apple:watchos:2.2:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:apple:apple_tv:9.2:*:*:*:*:*:*:* (and previous)
          *cpe:2.3:o:apple:iphone_os:9.3.1:*:*:*:*:*:*:* (and previous)
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-119
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html No Types Assigned
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html No Types Assigned
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html No Types Assigned
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html Advisory
Changed Reference Type
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html No Types Assigned
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html Advisory
Changed Reference Type
https://support.apple.com/HT206564 No Types Assigned
https://support.apple.com/HT206564 Advisory
Changed Reference Type
https://support.apple.com/HT206566 No Types Assigned
https://support.apple.com/HT206566 Advisory
Changed Reference Type
https://support.apple.com/HT206567 No Types Assigned
https://support.apple.com/HT206567 Advisory
Changed Reference Type
https://support.apple.com/HT206568 No Types Assigned
https://support.apple.com/HT206568 Advisory

CVE Modified by Source 9/08/2016 10:0:43 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

CVE Modified by Source 7/13/2016 9:59:56 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2016:1292