Vulnerability Details : CVE-2015-8710
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2015-8710
Probability of exploitation activity in the next 30 days: 0.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-8710
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2015-8710
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8710
-
http://www.debian.org/security/2015/dsa-3430
Debian -- Security Information -- DSA-3430-1 libxml2Third Party Advisory
-
http://www.securityfocus.com/bid/79811
libxml2 CVE-2015-8710 Out-of-bounds Memory Access VulnerabilityThird Party Advisory;VDB Entry
-
https://hackerone.com/reports/57125#activity-384861
#57125 comment out causes information disclosureThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/09/13/1
oss-security - Re: libxml2 issue: out-of-bounds memory access when parsing an unclosed HTML commentMailing List
-
http://www.openwall.com/lists/oss-security/2015/04/19/4
oss-security - libxml2 issue: out-of-bounds memory access when parsing an unclosed HTML commentMailing List;Patch
-
http://rhn.redhat.com/errata/RHSA-2016-1089.html
Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.gnome.org/show_bug.cgi?id=746048
Bug 746048 – parsing an unclosed comment can result in `Conditional jump or move depends on uninitialised value(s)` and unsafe memory accessIssue Tracking
-
http://www.openwall.com/lists/oss-security/2015/12/31/7
oss-security - Re: libxml2 issue: out-of-bounds memory access when parsing an unclosed HTML commentMailing List
-
https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
Fix parsing short unclosed comment uninitialized access (e724879d) · Commits · GNOME / libxml2 · GitLabThird Party Advisory
Products affected by CVE-2015-8710
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*