First published: Wed Apr 13 2016(Updated: )
dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libxml2 | 2.9.4+dfsg1-7+deb10u4 2.9.4+dfsg1-7+deb10u6 2.9.10+dfsg-6.7+deb11u4 2.9.14+dfsg-1.3~deb12u1 2.9.14+dfsg-1.3 | |
libxml2-devel | <2.9.4 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8806 has been classified as a denial of service vulnerability due to heap-based buffer over-read and application crash.
To fix CVE-2015-8806, you should upgrade to the patched versions of libxml2 as specified in the security advisories.
CVE-2015-8806 affects versions of libxml2 prior to 2.9.4 and up to 2.9.4+dfsg1-7+deb10u4.
Yes, CVE-2015-8806 can be exploited by remote attackers through crafted HTML documents.
The impact of CVE-2015-8806 is a denial of service, causing the application to crash upon processing certain input.