CVE-2017-5130
07.02.2018, 23:29
An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.Enginsight
| Vendor | Product | Version |
|---|---|---|
| chrome | 𝑥 < 62.0.3202.62 | |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
| xmlsoft | libxml2 | 𝑥 < 2.9.5 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| chromium-browser |
| ||||||||||||
| libxml2 |
| ||||||||||||
| oxide-qt |
|
Common Weakness Enumeration
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
References