6.8
CVSSv2

CVE-2015-5522

Published: 11/08/2015 Updated: 08/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the ParseValue function in lexer.c in tidy prior to 4.9.31 allows remote malicious users to cause a denial of service (crash) via vectors involving a command character in an href.

Vulnerable Product Search on Vulmon Subscribe to Product

htacg tidy

canonical ubuntu linux 12.04

canonical ubuntu linux 15.04

canonical ubuntu linux 14.04

debian debian linux 8.0

debian debian linux 7.0

apple mac os x

apple watchos

apple iphone os

Vendor Advisories

Debian Bug report logs - #792571 tidy: CVE-2015-5522 and CVE-2015-5523 Package: src:tidy; Maintainer for src:tidy is Tidy HTML5 <tidy-html5@packagesdebianorg>; Reported by: Alessandro Ghedini <ghedo@debianorg> Date: Thu, 16 Jul 2015 11:33:01 UTC Severity: important Tags: jessie, patch, security, sid, squeeze, stre ...
HTML Tidy could be made to crash or run programs if it processed specially crafted data ...
Fernando Muñoz discovered that invalid HTML input passed to tidy, an HTML syntax checker and reformatter, could trigger a buffer overflow This could allow remote attackers to cause a denial of service (crash) or potentially execute arbitrary code Geoff McLane also discovered that a similar issue could trigger an integer overflow, leading to a me ...