Описание
Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.6.24.dfsg-1ubuntu1.4 |
devel | not-affected | 2.6.32.dfsg-5ubuntu1 |
gutsy | released | 2.6.30.dfsg-2ubuntu1.4 |
hardy | released | 2.6.31.dfsg-2ubuntu1.3 |
intrepid | released | 2.6.32.dfsg-4ubuntu1.1 |
upstream | needs-triage |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 al ...
Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
EPSS
10 Critical
CVSS2