MEDIUM · 4.3

CVE-2015-7941

libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1)...

Vulnerability Description

libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.

CVSS Score

4.3

MEDIUM

AV:N/AC:M/Au:N/C:N/I:N/A:P
Confidentiality
NONE
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
CanonicalUbuntu Linux12.04
XmlsoftLibxml22.9.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2015-7941?

CVE-2015-7941 is a vulnerability with a CVSS score of 4.3 (MEDIUM). libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1)...

How severe is CVE-2015-7941?

CVE-2015-7941 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2015-7941?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Xmlsoft Libxml2.