{"id":"CVE-2016-3627","details":"The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.","modified":"2026-04-11T12:01:11.161686Z","published":"2016-05-17T14:08:02.703Z","related":["MGASA-2016-0187","SUSE-SU-2016:1204-1","SUSE-SU-2016:1205-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","openSUSE-SU-2024:10192-1","openSUSE-SU-2024:10228-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"3.0"}]},{"cpe":"cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"3.0"}]},{"cpe":"cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"3.3"}]},{"cpe":"cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"3.4"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"14.04"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"15.10"}]},{"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"16.04"}]},{"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}]},{"cpe":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"42.1"}]},{"cpe":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"11.3"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.3"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.4"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.5"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.7"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.4"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10170"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/84992"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035335"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2994-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1292"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157239"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-37"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2016-18"},{"type":"FIX","url":"http://seclists.org/fulldisclosure/2016/May/10"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/03/21/2"},{"type":"FIX","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2016/03/21/3"},{"type":"ARTICLE","url":"https://www.debian.org/security/2016/dsa-3593"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/libxml2","events":[{"introduced":"0"},{"last_affected":"6657afe83a38278f124ace71dc85f60420beb2d5"},{"last_affected":"2189b59b1005976970ebadb65edbb289f9e091ff"}],"database_specific":{"cpe":["cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.9.3"},{"last_affected":"6.0"}]}}],"versions":["CVE-2013-2877","CVE-2014-0191","CVE-2014-3660","CVE-2015-1819","CVE-2015-5312","CVE-2015-7497","CVE-2015-7498","CVE-2015-7499-1","CVE-2015-7499-2","CVE-2015-7500","CVE-2015-7941_1","CVE-2015-7941_2","CVE-2015-7942","CVE-2015-7942-2","CVE-2015-8035","CVE-2015-8242","CVE-2015-8317","EAZEL-NAUTILUS-MS-AUG07","FOR_GNOME_0_99_1","GNOME_0_30","GNOME_PRINT_0_24","GNUMERIC_FIRST_PUBLIC_RELEASE","LIBXML2.6.32","LIBXML2.7.0","LIBXML2.7.1","LIBXML2.7.2","LIBXML2.7.3","LIBXML2_2_4_21","LIBXML2_2_5_0","LIBXML2_2_5_10","LIBXML2_2_5_7","LIBXML2_2_5_8","LIBXML2_2_5_9","LIBXML2_2_5_x","LIBXML2_2_6_1","LIBXML2_2_6_11","LIBXML2_2_6_12","LIBXML2_2_6_13","LIBXML2_2_6_14","LIBXML2_2_6_15","LIBXML2_2_6_16","LIBXML2_2_6_18","LIBXML2_2_6_19","LIBXML2_2_6_2","LIBXML2_2_6_20","LIBXML2_2_6_21","LIBXML2_2_6_22","LIBXML2_2_6_23","LIBXML2_2_6_24","LIBXML2_2_6_26","LIBXML2_2_6_27","LIBXML2_2_6_28","LIBXML2_2_6_3","LIBXML2_2_6_4","LIBXML2_2_6_5","LIBXML2_2_6_6","LIBXML2_2_6_7","LIBXML2_2_6_8","LIBXML2_2_6_9","LIBXML2_6_0","LIBXML_0_99","LIBXML_1_5_0","LIBXML_1_8_5","LIBXML_1_8_6","LIBXML_2_0_0","LIBXML_2_1_0","LIBXML_2_1_1","LIBXML_2_2_1","LIBXML_2_2_3","LIBXML_2_2_4","LIBXML_2_2_6","LIBXML_2_2_7","LIBXML_2_2_8","LIBXML_2_3_0","LIBXML_2_3_10","LIBXML_2_3_11","LIBXML_2_3_12","LIBXML_2_3_13","LIBXML_2_3_14","LIBXML_2_3_2","LIBXML_2_3_3","LIBXML_2_3_4","LIBXML_2_3_5","LIBXML_2_3_6","LIBXML_2_3_7","LIBXML_2_3_8","LIBXML_2_3_9","LIBXML_2_4_0","LIBXML_2_4_11","LIBXML_2_4_12","LIBXML_2_4_13","LIBXML_2_4_14","LIBXML_2_4_16","LIBXML_2_4_18","LIBXML_2_4_2","LIBXML_2_4_20","LIBXML_2_4_22","LIBXML_2_4_23","LIBXML_2_4_24","LIBXML_2_4_25","LIBXML_2_4_26","LIBXML_2_4_27","LIBXML_2_4_29","LIBXML_2_4_3","LIBXML_2_4_30","LIBXML_2_4_4","LIBXML_2_4_6","LIBXML_2_4_7","LIBXML_2_5_1","LIBXML_2_5_2","LIBXML_2_5_3","LIBXML_2_5_4","LIBXML_2_5_5","LIBXML_2_5_6","LIBXML_2_6_10","LIBXML_TEST_2_0_0","LIB_XML_1_1","LIB_XML_1_3","LIB_XML_1_4","LIB_XML_1_6_1","LIB_XML_1_6_2","LIB_XML_1_7_0","LIB_XML_1_7_1","LIB_XML_1_7_3","LIB_XML_1_8_3","LIB_XML_1_X","PRE_MUCKUP","PRE_MUCKUP2","PRE_MUCKUP3","help","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.7.8","v2.8.0","v2.8.0-rc1","v2.8.0-rc2","v2.9.0","v2.9.0-rc2","v2.9.1","v2.9.2","v2.9.2-rc1","v2.9.2-rc2","v2.9.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-3627.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}