MEDIUM · 5.0

CVE-2015-7497

Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.

Vulnerability Description

Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
DebianDebian Linux7.0
CanonicalUbuntu Linux12.04
XmlsoftLibxml2<= 2.9.2
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Hpc Node6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Workstation6.0
HpIcewall Federation Agent3.0
HpIcewall File Manager3.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-7497?

CVE-2015-7497 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.

How severe is CVE-2015-7497?

CVE-2015-7497 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-7497?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Canonical Ubuntu Linux, Xmlsoft Libxml2, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Hpc Node.