SB2016041217 - Buffer overflow in Libxml2
Published: April 12, 2016 Updated: July 18, 2020
Security Bulletin ID
SB2016041217
Severity
High
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2015-8710)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
Remediation
Install update from vendor's website.
References
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/04/19/4
- http://www.openwall.com/lists/oss-security/2015/09/13/1
- http://www.openwall.com/lists/oss-security/2015/12/31/7
- http://www.securityfocus.com/bid/79811
- https://bugzilla.gnome.org/show_bug.cgi?id=746048
- https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
- https://hackerone.com/reports/57125#activity-384861