CVE-2017-7375
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
Published
2018-02-19T19:29:00.703
Last Modified
2025-12-03T22:15:49.657
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 9.8 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
-
Type: Primary
CWE-611
-
Type: Secondary
CWE-611
Affected Vendors & Products
References
-
http://www.securityfocus.com/bid/98877
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1038623
Third Party Advisory, VDB Entry
([email protected])
-
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
Patch, Third Party Advisory
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
Patch, Third Party Advisory
([email protected])
-
https://security.gentoo.org/glsa/201711-01
Third Party Advisory
([email protected])
-
https://source.android.com/security/bulletin/2017-06-01
Patch, Third Party Advisory
([email protected])
-
https://www.debian.org/security/2017/dsa-3952
Third Party Advisory
([email protected])
-
http://www.securityfocus.com/bid/98877
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1038623
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/201711-01
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://source.android.com/security/bulletin/2017-06-01
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2017/dsa-3952
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)