CVE-2017-17497Improper Restriction of Operations within the Bounds of a Memory Buffer in Tidy-html5

Severity
7.5HIGHNVD
EPSS
0.3%
top 49.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 10
Latest updateMay 13

Description

In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers to cause a denial of service (Segmentation Fault), because the currentNode variable in the "children of the head" processing feature is modified in the loop without validating the new value.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/tidy-html5< tidy-html5 2:5.6.0-3 (bookworm)
Debianhtacg/tidy-html5< 2:5.6.0-3+3
NVDhtacg/tidy5.7.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xj89-pr57-g8p3: In Tidy 52022-05-13
OSV
CVE-2017-17497: In Tidy 52017-12-10

📋Vendor Advisories

2
Red Hat
tidy: Segmentation fault in the prvTidyTidyMetaCharset function2017-12-09
Debian
CVE-2017-17497: tidy-html5 - In Tidy 5.7.0, the prvTidyTidyMetaCharset function in clean.c allows attackers t...2017

💬Community

3
Bugzilla
CVE-2017-17497 tidy: Segmentation fault in the prvTidyTidyMetaCharset function2017-12-11
Bugzilla
CVE-2017-13692 CVE-2017-17497 tidy: various flaws [epel-7]2017-08-28
Bugzilla
CVE-2017-13692 CVE-2017-17497 tidy: various flaws [fedora-all]2017-08-28