Описание
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.9.4+dfsg1-3.1 |
| esm-infra-legacy/trusty | released | 2.9.1+dfsg1-3ubuntu4.10 |
| esm-infra/xenial | released | 2.9.3+dfsg1-1ubuntu0.3 |
| precise/esm | not-affected | 2.7.8.dfsg-5.1ubuntu4.18 |
| trusty | released | 2.9.1+dfsg1-3ubuntu4.10 |
| trusty/esm | released | 2.9.1+dfsg1-3ubuntu4.10 |
| upstream | released | 2.9.4+dfsg1-3.1, 2.9.5 |
| vivid/ubuntu-core | DNE | |
| xenial | released | 2.9.3+dfsg1-1ubuntu0.3 |
| yakkety | ignored | end of life |
Показывать по
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Buffer overflow in libxml2 allows remote attackers to execute arbitrar ...
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
Уязвимость библиотеки для анализа XML-файлов libxml2, связанная с некорректным вычислением размера буфера для значения порта, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
EPSS
10 Critical
CVSS2
9.8 Critical
CVSS3