{"id":"UBUNTU-CVE-2016-4658","details":"xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.","modified":"2026-02-04T02:59:37.693195Z","published":"2016-09-25T00:00:00Z","related":["USN-3235-1"],"upstream":["CVE-2016-4658"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4658"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html"},{"type":"REPORT","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html"},{"type":"REPORT","url":"https://support.apple.com/HT207141"},{"type":"REPORT","url":"https://support.apple.com/HT207142"},{"type":"REPORT","url":"https://support.apple.com/HT207143"},{"type":"REPORT","url":"https://support.apple.com/HT207170"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3235-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-4658"}],"affected":[{"package":{"name":"libxml2","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libxml2@2.9.1+dfsg1-3ubuntu4.9?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.1+dfsg1-3ubuntu4.9"}]}],"versions":["2.9.1+dfsg1-3ubuntu2","2.9.1+dfsg1-3ubuntu3","2.9.1+dfsg1-3ubuntu4","2.9.1+dfsg1-3ubuntu4.1","2.9.1+dfsg1-3ubuntu4.2","2.9.1+dfsg1-3ubuntu4.3","2.9.1+dfsg1-3ubuntu4.4","2.9.1+dfsg1-3ubuntu4.5","2.9.1+dfsg1-3ubuntu4.6","2.9.1+dfsg1-3ubuntu4.7","2.9.1+dfsg1-3ubuntu4.8"],"ecosystem_specific":{"binaries":[{"binary_name":"libxml2","binary_version":"2.9.1+dfsg1-3ubuntu4.9"},{"binary_name":"libxml2-dev","binary_version":"2.9.1+dfsg1-3ubuntu4.9"},{"binary_name":"libxml2-utils","binary_version":"2.9.1+dfsg1-3ubuntu4.9"},{"binary_name":"python-libxml2","binary_version":"2.9.1+dfsg1-3ubuntu4.9"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4658.json"}},{"package":{"name":"libxml2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libxml2@2.9.3+dfsg1-1ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.3+dfsg1-1ubuntu0.2"}]}],"versions":["2.9.2+zdfsg1-4","2.9.2+zdfsg1-4ubuntu1","2.9.2+zdfsg1-4ubuntu2","2.9.2+zdfsg1-4ubuntu3","2.9.3+dfsg1-1","2.9.3+dfsg1-1ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"libxml2","binary_version":"2.9.3+dfsg1-1ubuntu0.2"},{"binary_name":"libxml2-dev","binary_version":"2.9.3+dfsg1-1ubuntu0.2"},{"binary_name":"libxml2-utils","binary_version":"2.9.3+dfsg1-1ubuntu0.2"},{"binary_name":"python-libxml2","binary_version":"2.9.3+dfsg1-1ubuntu0.2"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-4658.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}