DSA-3309-1 tidy -- tidyID: oval:org.secpod.oval:def:602170 | Date: (C)2015-07-27 (M)2024-02-19 |
Class: PATCH | Family: unix |
Fernando Muñoz discovered that invalid HTML input passed to tidy, an HTML syntax checker and reformatter, could trigger a buffer overflow. This could allow remote attackers to cause a denial of service or potentially execute arbitrary code. Geoff McLane also discovered that a similar issue could trigger an integer overflow, leading to a memory allocation of 4GB. This could allow remote attackers to cause a denial of service by saturating the target"s memory.
Platform: |
Debian 8.x |
Debian 7.x |