[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3309-1 tidy -- tidy

ID: oval:org.secpod.oval:def:602170Date: (C)2015-07-27   (M)2024-02-19
Class: PATCHFamily: unix




Fernando Muñoz discovered that invalid HTML input passed to tidy, an HTML syntax checker and reformatter, could trigger a buffer overflow. This could allow remote attackers to cause a denial of service or potentially execute arbitrary code. Geoff McLane also discovered that a similar issue could trigger an integer overflow, leading to a memory allocation of 4GB. This could allow remote attackers to cause a denial of service by saturating the target"s memory.

Platform:
Debian 8.x
Debian 7.x
Product:
tidy
Reference:
DSA-3309-1
CVE-2015-5522
CVE-2015-5523
CVE    2
CVE-2015-5522
CVE-2015-5523
CPE    3
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
cpe:/a:tidy:tidy

© SecPod Technologies