Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-39615

Опубликовано: 29 авг. 2023
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.

A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7libxml2Out of support scope
Red Hat Enterprise Linux 8libxml2FixedRHSA-2024:011910.01.2024
Red Hat Enterprise Linux 8libxml2FixedRHSA-2024:011910.01.2024
Red Hat Enterprise Linux 8.6 Extended Update Supportlibxml2FixedRHSA-2024:041325.01.2024
Red Hat Enterprise Linux 8.8 Extended Update Supportlibxml2FixedRHSA-2023:754428.11.2023
Red Hat Enterprise Linux 9libxml2FixedRHSA-2023:774712.12.2023
Red Hat Enterprise Linux 9libxml2FixedRHSA-2023:774712.12.2023
Red Hat OpenShift Container Platform 4.13openshift4-wincw/windows-machine-config-operator-bundleFixedRHSA-2024:147725.03.2024
Red Hat OpenShift Container Platform 4.13openshift4-wincw/windows-machine-config-rhel9-operatorFixedRHSA-2024:147725.03.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2235864libxml2: crafted xml can cause global buffer overflow

EPSS

Процентиль: 27%
0.00095
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 2 года назад

Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.

CVSS3: 6.5
nvd
почти 2 года назад

Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.

CVSS3: 6.5
debian
почти 2 года назад

Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds rea ...

suse-cvrf
почти 2 года назад

Security update for libxml2

suse-cvrf
почти 2 года назад

Security update for libxml2

EPSS

Процентиль: 27%
0.00095
Низкий

6.5 Medium

CVSS3

Уязвимость CVE-2023-39615