Vigil@nce - libxml2: unreachable memory reading via xmlSAX2TextNode
December 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can create a malformed XML/HTML file, in order to
generate a denial of service in applications linked to libxml2.
Impacted products: Fedora, libxml2.
Severity: 1/4.
Creation date: 19/11/2015.
DESCRIPTION OF THE VULNERABILITY
The libxml2 library implements an XML parser.
However, the xmlSAX2TextNode()/htmlParseTryOrFinish() function
tries to read an unreachable memory area, which triggers a fatal
error.
An attacker can therefore create a malformed XML/HTML file, in
order to generate a denial of service in applications linked to
libxml2.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/libxml2-unreachable-memory-reading-via-xmlSAX2TextNode-18334