Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3516

Опубликовано: 01 июн. 2021
Источник: debian
EPSS Низкий

Описание

There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2fixed2.9.10+dfsg-6.6package
libxml2fixed2.9.4+dfsg1-7+deb10u2busterpackage

Примечания

  • https://gitlab.gnome.org/GNOME/libxml2/-/issues/230

  • https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539

EPSS

Процентиль: 58%
0.00362
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 4 лет назад

There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.

CVSS3: 7.8
redhat
больше 4 лет назад

There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.

CVSS3: 7.8
nvd
около 4 лет назад

There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.

github
около 3 лет назад

There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость компонента xmllint библиотеки Libxml2, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 58%
0.00362
Низкий