Vulnerability Description
In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Htacg | Tidy | 5.7.0 |
Related Weaknesses (CWE)
References
- https://github.com/htacg/tidy-html5/issues/656Issue TrackingPatchThird Party Advisory
- https://github.com/htacg/tidy-html5/issues/656Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2017-17497?
CVE-2017-17497 is a vulnerability with a CVSS score of 7.5 (HIGH). In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" process...
How severe is CVE-2017-17497?
CVE-2017-17497 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17497?
Check the references section above for vendor advisories and patch information. Affected products include: Htacg Tidy.