First published: Fri Nov 13 2015(Updated: )
Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP IceWall Federation Agent | =3.0 | |
HP Icewall File Manager | =3.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
Debian | =7.0 | |
Debian | =8.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
libxml2-devel | <=2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7498 has a severity rating that could allow a denial of service due to heap-based buffer overflow.
To fix CVE-2015-7498, upgrade to libxml2 version 2.9.3 or later.
CVE-2015-7498 affects libxml2 versions prior to 2.9.3, as well as various software including HP IceWall Federation Agent 3.0 and Ubuntu Linux versions 12.04 to 15.10.
CVE-2015-7498 is a heap-based buffer overflow vulnerability.
Yes, CVE-2015-7498 can potentially be exploited by context-dependent attackers through specific vectors.