First published: Mon Nov 02 2015(Updated: )
A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libxml2 | <0:2.9.1-6.el7.4 | 0:2.9.1-6.el7.4 |
Debian | =7.0 | |
Debian | =8.0 | |
libxml2 | =2.9.1 | |
iStyle @cosme iPhone OS | <=9.2.1 | |
Apple iOS and macOS | <=10.11.3 | |
tvOS | <=9.1 | |
Apple iOS, iPadOS, and watchOS | <=2.1 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2015-8035 is classified as a denial of service vulnerability that can cause applications using libxml2 to crash.
To fix CVE-2015-8035, update your libxml2 package to a version that is not vulnerable, based on your operating system's recommendations.
CVE-2015-8035 affects libxml2 versions prior to 2.9.1-6.el7.4 and other specific distributions including Debian 7.0 and 8.0.
CVE-2015-8035 enables remote attackers to exploit the vulnerability by sending specially crafted XML or HTML files that crash the application.
While CVE-2015-8035 presents a serious denial of service risk, the likelihood of exploitation depends on the specific application's exposure to untrusted XML or HTML input.