Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17497

Опубликовано: 09 дек. 2017
Источник: redhat
CVSS3: 3.3

Описание

In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tidyNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1524567tidy: Segmentation fault in the prvTidyTidyMetaCharset function

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.

CVSS3: 7.5
nvd
около 8 лет назад

In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.

CVSS3: 7.5
debian
около 8 лет назад

In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows a ...

CVSS3: 7.5
github
больше 3 лет назад

In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.

3.3 Low

CVSS3