CVE-2015-8710
libxml2: out-of-bounds memory access when parsing an unclosed HTML comment
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
La función htmlParseComment en HTMLparser.c en libxml2 permite a atacantes obtener información sensible, provocar una denegación de servicio (acceso a memoria dinámica fuera de límites y caída de aplicación), o posiblemente tener otro impacto no especificado a través de un comentario HTML no cerrado.
It was discovered that libxml2 could access out-of-bounds memory when parsing unclosed HTML comments. A remote attacker could provide a specially crafted XML file that, when processed by an application linked against libxml2, could cause the application to disclose heap memory contents.
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector, JBoss HTTP Connector, Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.0.3 serves as a replacement for Red Hat JBoss Web Server 3.0.2, and includes bug fixes and enhancements, which are documented in the Release Notes documented linked to in the References.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-31 CVE Reserved
- 2016-01-20 CVE Published
- 2018-05-11 First Exploit
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/09/13/1 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2015/12/31/7 | Mailing List |
|
http://www.securityfocus.com/bid/79811 | Third Party Advisory | |
https://bugzilla.gnome.org/show_bug.cgi?id=746048 | Issue Tracking | |
https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c | Third Party Advisory | |
https://hackerone.com/reports/57125#activity-384861 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/Karm/CVE-2015-8710 | 2018-05-11 |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/04/19/4 | 2020-02-26 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-1089.html | 2020-02-26 | |
http://www.debian.org/security/2015/dsa-3430 | 2020-02-26 | |
https://access.redhat.com/security/cve/CVE-2015-8710 | 2016-05-17 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1213957 | 2016-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xmlsoft Search vendor "Xmlsoft" | Libxml2 Search vendor "Xmlsoft" for product "Libxml2" | < 2.9.3 Search vendor "Xmlsoft" for product "Libxml2" and version " < 2.9.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|