HIGH · 7.1

CVE-2015-5312

The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consu...

Vulnerability Description

The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.

CVSS Score

7.1

HIGH

AV:N/AC:M/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
CanonicalUbuntu Linux12.04
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Hpc Node6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Workstation6.0
AppleIphone Os<= 9.2.1
AppleMac Os X<= 10.11.3
AppleTvos<= 9.1
AppleWatchos<= 2.1
XmlsoftLibxml2<= 2.9.2
HpIcewall Federation Agent3.0
HpIcewall File Manager3.0
DebianDebian Linux7.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-5312?

CVE-2015-5312 is a vulnerability with a CVSS score of 7.1 (HIGH). The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consu...

How severe is CVE-2015-5312?

CVE-2015-5312 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-5312?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Hpc Node, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.