Описание
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to leak potentially sensitive information.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | libxml2 | Will not fix | ||
Red Hat JBoss Enterprise Web Server 1 | libxml2 | Affected | ||
Red Hat JBoss Enterprise Web Server 2 | libxml2 | Will not fix | ||
Red Hat Enterprise Linux 6 | libxml2 | Fixed | RHSA-2015:2549 | 07.12.2015 |
Red Hat Enterprise Linux 7 | libxml2 | Fixed | RHSA-2015:2550 | 07.12.2015 |
Red Hat JBoss Web Server 3.0 | libxml2 | Fixed | RHSA-2016:1089 | 17.05.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Heap-based buffer overflow in the xmlGROW function in parser.c in libx ...
Уязвимость библиотеки libxml2, позволяющая нарушителю получить доступ к защищаемой информации из памяти процесса
EPSS
4.3 Medium
CVSS2