Severity
6.8MEDIUM
EPSS
1.5%
top 19.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 18
Latest updateMay 14

Description

The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages8 packages

Debianlibxml2< 2.9.3+dfsg1-1+3
NVDxmlsoft/libxml22.9.2
NVDapple/tvos9.1
NVDapple/watchos2.1
NVDapple/mac_os_x10.11.3

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 12.04, 14.04, 15.04, 15.10

🔴Vulnerability Details

3
GHSA
GHSA-w76w-8f65-r427: The xmlParseConditionalSections function in parser2022-05-14
OSV
CVE-2015-7942: The xmlParseConditionalSections function in parser2015-11-18
CVEList
CVE-2015-7942: The xmlParseConditionalSections function in parser2015-11-18

📋Vendor Advisories

7
Ubuntu
libxml2 vulnerabilities2015-11-16
Red Hat
libxml2: heap-based buffer overflow in xmlParseConditionalSections()2015-10-22
Debian
CVE-2015-7942: libxml2 - The xmlParseConditionalSections function in parser.c in libxml2 does not properl...2015
Apple
CVE-2015-7942: iOS 9.3
Apple
CVE-2015-7942: OS X El Capitan v10.11.4 and Security Update 2016-002

💬Community

5
Bugzilla
CVE-2015-7942 mingw-libxml2: libxml2: heap-based buffer overflow in xmlParseConditionalSections() [fedora-all]2015-10-29
Bugzilla
CVE-2015-7942 mingw-libxml2: libxml2: heap-based buffer overflow in xmlParseConditionalSections() [epel-7]2015-10-29
Bugzilla
CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections() [fedora-all]2015-10-29
Bugzilla
CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()2015-10-29
Bugzilla
CVE-2014-7942 chromium-browser: uninitialized-value in Fonts2015-01-23
CVE-2015-7942 (MEDIUM CVSS 6.8) | The xmlParseConditionalSections fun | cvebase.io