Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
13 Feb 2023, 00:53
Type | Values Removed | Values Added |
---|---|---|
Summary | Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors. | |
References |
|
02 Feb 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to leak potentially sensitive information. |
Information
Published : 2015-12-15 21:59
Updated : 2023-12-10 11:46
NVD link : CVE-2015-7499
Mitre link : CVE-2015-7499
CVE.ORG link : CVE-2015-7499
JSON object : View
Products Affected
hp
- icewall_file_manager
- icewall_federation_agent
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_hpc_node
apple
- iphone_os
- tvos
- watchos
- mac_os_x
opensuse
- opensuse
- leap
debian
- debian_linux
canonical
- ubuntu_linux
xmlsoft
- libxml2
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer