Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5312

Опубликовано: 15 дек. 2015
Источник: debian

Описание

The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2fixed2.9.3+dfsg1-1package

Примечания

  • https://gitlab.gnome.org/GNOME/libxml2/-/commit/69030714cde66d525a8884bda01b9e8f0abf8e1e (v2.9.3)

  • https://bugzilla.gnome.org/show_bug.cgi?id=756733 (upstream bug not yet open)

Связанные уязвимости

ubuntu
около 10 лет назад

The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.

redhat
около 10 лет назад

The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.

nvd
около 10 лет назад

The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.

github
больше 7 лет назад

Nokogiri subject to DoS via libxml2 vulnerability

fstec
около 10 лет назад

Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании