{"id":"USN-3271-1","summary":"libxslt vulnerabilities","details":"Holger Fuhrmannek discovered an integer overflow in the\nxsltAddTextString() function in Libxslt. An attacker could use\nthis to craft a malicious document that, when opened, could cause a\ndenial of service (application crash) or possible execute arbitrary\ncode. (CVE-2017-5029)\n\nNicolas Gregoire discovered that Libxslt mishandled namespace\nnodes. An attacker could use this to craft a malicious document that,\nwhen opened, could cause a denial of service (application crash)\nor possibly execute arbtrary code. This issue only affected Ubuntu\n16.04 LTS, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS. (CVE-2016-1683)\n\nSebastian Apelt discovered that a use-after-error existed in the\nxsltDocumentFunctionLoadDocument() function in Libxslt. An attacker\ncould use this to craft a malicious document that, when opened,\ncould cause a denial of service (application crash) or possibly\nexecute arbitrary code. This issue only affected Ubuntu 16.04 LTS,\nUbuntu 14.04 LTS, and Ubuntu 12.04 LTS. (CVE-2016-1841)\n\nIt was discovered that a type confusion error existed in the\nxsltStylePreCompute() function in Libxslt. An attacker could use this\nto craft a malicious XML file that, when opened, caused a denial of\nservice (application crash). This issue only affected Ubuntu 14.04\nLTS and Ubuntu 12.04 LTS. (CVE-2015-7995)\n\nNicolas Gregoire discovered the Libxslt mishandled the 'i' and 'a'\nformat tokens for xsl:number data. An attacker could use this to\ncraft a malicious document that, when opened, could cause a denial of\nservice (application crash). This issue only affected Ubuntu 16.04 LTS,\nUbuntu 14.04 LTS, and Ubuntu 12.04 LTS. (CVE-2016-1684)\n\nIt was discovered that the xsltFormatNumberConversion() function\nin Libxslt did not properly handle empty decimal separators. An\nattacker could use this to craft a malicious document that, when\nopened, could cause a denial of service (application crash). This\nissue only affected Ubuntu 16.10, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS,\nand Ubuntu 12.04 LTS. (CVE-2016-4738)\n","modified":"2026-02-10T04:41:07Z","published":"2017-04-28T04:47:36Z","related":["UBUNTU-CVE-2015-7995","UBUNTU-CVE-2016-1683","UBUNTU-CVE-2016-1684","UBUNTU-CVE-2016-1841","UBUNTU-CVE-2016-4607","UBUNTU-CVE-2016-4608","UBUNTU-CVE-2016-4609","UBUNTU-CVE-2016-4610","UBUNTU-CVE-2016-4612","UBUNTU-CVE-2016-4738","UBUNTU-CVE-2017-5029"],"upstream":["CVE-2015-7995","CVE-2016-1683","CVE-2016-1684","CVE-2016-1841","CVE-2016-4738","CVE-2017-5029","UBUNTU-CVE-2015-7995","UBUNTU-CVE-2016-1683","UBUNTU-CVE-2016-1684","UBUNTU-CVE-2016-1841","UBUNTU-CVE-2016-4738","UBUNTU-CVE-2017-5029"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3271-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-7995"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1683"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1684"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-1841"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-4738"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5029"}],"affected":[{"package":{"name":"libxslt","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/libxslt@1.1.28-2ubuntu0.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.28-2ubuntu0.1"}]}],"versions":["1.1.28-2","1.1.28-2build1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.1.28-2ubuntu0.1","binary_name":"libxslt1-dev"},{"binary_version":"1.1.28-2ubuntu0.1","binary_name":"libxslt1.1"},{"binary_version":"1.1.28-2ubuntu0.1","binary_name":"python-libxslt1"},{"binary_version":"1.1.28-2ubuntu0.1","binary_name":"xsltproc"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3271-1.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"id":"CVE-2015-7995","severity":[{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2016-1683","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1684","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1841","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-4738","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-5029","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"libxslt","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/libxslt@1.1.28-2.1ubuntu0.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.28-2.1ubuntu0.1"}]}],"versions":["1.1.28-2build2","1.1.28-2.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.1.28-2.1ubuntu0.1","binary_name":"libxslt1-dev"},{"binary_version":"1.1.28-2.1ubuntu0.1","binary_name":"libxslt1.1"},{"binary_version":"1.1.28-2.1ubuntu0.1","binary_name":"python-libxslt1"},{"binary_version":"1.1.28-2.1ubuntu0.1","binary_name":"xsltproc"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3271-1.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"id":"CVE-2016-1683","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1684","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-1841","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2016-4738","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2017-5029","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.3"}