vulnerability
Juniper Junos OS: 2019-01 Security Bulletin: Junos OS: Multiple vulnerabilities in libxml2 (JSA10916) (multiple CVEs)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | 2016-06-09 | 2019-01-10 | 2025-04-23 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
2016-06-09
Added
2019-01-10
Modified
2025-04-23
Description
A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
Solution
juniper-junos-os-upgrade-latest
References
- CVE-2015-8035
- https://attackerkb.com/topics/CVE-2015-8035
- CVE-2016-3627
- https://attackerkb.com/topics/CVE-2016-3627
- CVE-2016-3705
- https://attackerkb.com/topics/CVE-2016-3705
- CVE-2016-4447
- https://attackerkb.com/topics/CVE-2016-4447
- CVE-2016-4448
- https://attackerkb.com/topics/CVE-2016-4448
- CVE-2016-4449
- https://attackerkb.com/topics/CVE-2016-4449
- CVE-2017-18258
- https://attackerkb.com/topics/CVE-2017-18258
- CVE-2017-7375
- https://attackerkb.com/topics/CVE-2017-7375
- CVE-2018-9251
- https://attackerkb.com/topics/CVE-2018-9251
- JUNIPER-JSA10916

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.