First published: Sun Dec 10 2017(Updated: )
In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Htacg Tidy | =5.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17497 has a severity rating of 7.5, categorized as high.
To fix CVE-2017-17497, upgrade to a version of Tidy later than 5.7.0.
CVE-2017-17497 can lead to a denial of service due to a segmentation fault.
CVE-2017-17497 specifically affects Tidy version 5.7.0.
CVE-2017-17497 is associated with improper validation in the prvTidyTidyMetaCharset function.