CVE-2015-5522Improper Restriction of Operations within the Bounds of a Memory Buffer in Tidy

Severity
6.8MEDIUMNVD
EPSS
6.8%
top 8.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 11
Latest updateMay 17

Description

Heap-based buffer overflow in the ParseValue function in lexer.c in tidy before 4.9.31 allows remote attackers to cause a denial of service (crash) via vectors involving a command character in an href.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages8 packages

Ubuntuhtacg/tidy< 20091223cvs-1.2ubuntu1.1
NVDhtacg/tidy4.9.30
NVDapple/watchos1.0.1
NVDapple/mac_os_x10.6.8

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 14.04, 15.04

🔴Vulnerability Details

2
GHSA
GHSA-wp28-phrj-p6rh: Heap-based buffer overflow in the ParseValue function in lexer2022-05-17
OSV
CVE-2015-5522: Heap-based buffer overflow in the ParseValue function in lexer2015-07-16

📋Vendor Advisories

5
Ubuntu
HTML Tidy vulnerabilities2015-07-29
Red Hat
tidy: heap buffer overflow in ParseValue()2015-06-03
Apple
CVE-2015-5522: watchOS 2
Apple
CVE-2015-5522: iOS 9
Apple
CVE-2015-5522: OS X El Capitan v10.11

💬Community

1
Bugzilla
CVE-2015-5522 CVE-2015-5523 tidy: heap buffer overflow in ParseValue()2015-06-04