First published: Fri Nov 13 2015(Updated: )
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=9.2.1 | |
Apple iOS and macOS | <=10.11.3 | |
tvOS | <=9.1 | |
Apple iOS, iPadOS, and watchOS | <=2.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
redhat enterprise Linux desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
HP IceWall Federation Agent | =3.0 | |
HP Icewall File Manager | =3.0 | |
libxml2 | <=2.9.2 | |
Debian | =7.0 | |
Debian | =8.0 | |
openSUSE | =42.1 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7499 is classified as a high severity vulnerability due to its potential to allow attackers to read sensitive process memory information.
To fix CVE-2015-7499, upgrade libxml2 to version 2.9.3 or later.
CVE-2015-7499 affects various systems including Apple iPhone OS, Mac OS X, tvOS, watchOS, multiple versions of Ubuntu, Red Hat Enterprise Linux, and certain HP software products.
CVE-2015-7499 is a heap-based buffer overflow vulnerability.
Yes, CVE-2015-7499 can be exploited by context-dependent attackers through unspecified vectors.