First published: Tue Aug 11 2015(Updated: )
The ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Debian | =7.0 | |
Debian | =8.0 | |
iStyle @cosme iPhone OS | <=8.2 | |
Apple iOS and macOS | <=10.6.8 | |
Apple iOS, iPadOS, and watchOS | <=1.0.1 | |
HTACG Tidy | <=4.9.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5523 is classified as a denial of service vulnerability that can lead to a system crash.
To mitigate CVE-2015-5523, upgrade to Tidy version 4.9.31 or later, which addresses the vulnerability.
CVE-2015-5523 affects various versions of Ubuntu, Debian, macOS, and Apple iPhone OS that utilize Tidy prior to version 4.9.31.
CVE-2015-5523 allows remote attackers to perform a denial of service attack by triggering excessive memory allocation.
Yes, if your web applications use the vulnerable version of Tidy, they could be susceptible to exploitation through crafted inputs.