Vulnerability Description
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Hpc Node | 6.0 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Apple | Iphone Os | <= 9.2.1 |
| Apple | Mac Os X | <= 10.11.3 |
| Apple | Tvos | <= 9.1 |
| Apple | Watchos | <= 2.1 |
| Xmlsoft | Libxml2 | <= 2.9.2 |
| Hp | Icewall Federation Agent | 3.0 |
| Hp | Icewall File Manager | 3.0 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.htmlThird Party Advisory
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlMailing List
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2Third Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-2549.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-2550.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.h
- http://www.securityfocus.com/bid/79536
- http://www.securitytracker.com/id/1034243
FAQ
What is CVE-2015-5312?
CVE-2015-5312 is a vulnerability with a CVSS score of 7.1 (HIGH). The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consu...
How severe is CVE-2015-5312?
CVE-2015-5312 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5312?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Hpc Node, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.