High severity7.5NVD Advisory· Published May 17, 2016· Updated May 6, 2026
CVE-2016-3627
CVE-2016-3627
Description
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
Affected products
28- cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*+ 1 more
- cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*
- cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*
- cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- seclists.org/fulldisclosure/2016/May/10nvdMailing ListPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2016/03/21/2nvdMailing ListPatch
- www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmlnvdPatchThird Party Advisory
- rhn.redhat.com/errata/RHSA-2016-2957.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/84992nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1035335nvdBroken LinkThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2994-1nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2016:1292nvdThird Party Advisory
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party Advisory
- security.gentoo.org/glsa/201701-37nvdThird Party Advisory
- www.tenable.com/security/tns-2016-18nvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2016-05/msg00055.htmlnvdMailing List
- lists.opensuse.org/opensuse-updates/2016-05/msg00127.htmlnvdMailing List
- www.openwall.com/lists/oss-security/2016/03/21/3nvdMailing List
- kc.mcafee.com/corporate/indexnvdBroken Link
- www.debian.org/security/2016/dsa-3593nvdMailing List
News mentions
0No linked articles in our index yet.