First published: Tue Aug 11 2015(Updated: )
Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HTACG Tidy | <=4.9.30 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
iPhone OS | <=8.2 | |
Apple iOS and macOS | <=10.6.8 | |
Apple iOS, iPadOS, and watchOS | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5522 is classified as a high-severity vulnerability due to its potential to cause remote denial of service.
To fix CVE-2015-5522, update to Tidy version 4.9.31 or later.
CVE-2015-5522 affects Tidy versions prior to 4.9.31 and various versions of Ubuntu, Debian, Apple iOS, macOS, and watchOS.
CVE-2015-5522 is a heap-based buffer overflow vulnerability.
CVE-2015-5522 is caused by improper handling of command characters in an href within the ParseValue function.