A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2017-06-01 | vendor advisory |
http://www.debian.org/security/2017/dsa-3952 | vendor advisory |
http://www.securityfocus.com/bid/98877 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201711-01 | vendor advisory |
http://www.securitytracker.com/id/1038623 | vdb entry |
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | mailing list |
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | mailing list |