Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
13 Feb 2023, 00:53
Type | Values Removed | Values Added |
---|---|---|
Summary | Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors. | |
References |
|
02 Feb 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to leak potentially sensitive information. |
Information
Published : 2015-12-15 21:59
Updated : 2023-02-13 00:53
NVD link : CVE-2015-7499
Mitre link : CVE-2015-7499
CVE.ORG link : CVE-2015-7499
JSON object : View
Products Affected
opensuse
- leap
- opensuse
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
canonical
- ubuntu_linux
hp
- icewall_file_manager
- icewall_federation_agent
xmlsoft
- libxml2
apple
- tvos
- mac_os_x
- iphone_os
- watchos
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer