Описание
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-7376
- https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
- https://bugzilla.redhat.com/show_bug.cgi?id=1462216
- https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
- https://source.android.com/security/bulletin/2017-06-01
- https://www.debian.org/security/2017/dsa-3952
- http://www.securityfocus.com/bid/98877
- http://www.securitytracker.com/id/1038623
Связанные уязвимости
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Buffer overflow in libxml2 allows remote attackers to execute arbitrar ...
Уязвимость библиотеки для анализа XML-файлов libxml2, связанная с некорректным вычислением размера буфера для значения порта, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании