First published: Fri Aug 14 2015(Updated: )
The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/nokogiri | >=1.6.6.0<=1.6.6.3 | 1.6.6.4 |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Red Hat Enterprise Linux | <=5.0 | |
libxml2 | ||
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
iPhone OS | <=9.2.1 | |
Apple iOS and macOS | <=10.11.3 | |
tvOS | <=9.1 | |
Apple iOS, iPadOS, and watchOS | <=2.1 | |
Oracle Linux | =7 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Red Hat Fedora | =22 | |
Red Hat Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1819 has been rated as a medium severity vulnerability.
To fix CVE-2015-1819, update the affected versions of the libxml2 library and any dependent software to the latest releases.
CVE-2015-1819 allows remote attackers to perform denial of service attacks through crafted XML data.
CVE-2015-1819 affects several software packages including libxml2 and various Linux distributions like Debian and Ubuntu.
An XML Entity Expansion attack is a type of denial of service attack that exploits the XML parser's handling of deeply nested entities, leading to excessive memory consumption.