First published: Tue Aug 29 2023(Updated: )
** DISPUTED ** Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xmlsoft Libxml2 | =2.11.0 | |
F5 Traffix SDC | =5.1.0 | 5.2.0 |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Xmlsoft Libxml2 v2.11.0 is CVE-2023-39615.
The severity of CVE-2023-39615 is medium with a CVSS score of 6.5.
Attackers can exploit CVE-2023-39615 by supplying a crafted XML file to the xmlSAX2StartElement() function, causing an out-of-bounds read and potentially leading to a Denial of Service (DoS) attack.
The affected software for CVE-2023-39615 is Xmlsoft Libxml2 v2.11.0.
At the moment, there is no fix available for CVE-2023-39615. It is recommended to follow the vendor's updates and patches for any developments.