4.3
CVSSv2

CVE-2015-5523

Published: 11/08/2015 Updated: 08/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The ParseValue function in lexer.c in tidy prior to 4.9.31 allows remote malicious users to cause a denial of service (crash) via vectors involving multiple whitespace characters before an empty href, which triggers a large memory allocation.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 15.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

debian debian linux 8.0

debian debian linux 7.0

apple iphone os

apple mac os x

apple watchos

htacg tidy

Vendor Advisories

Debian Bug report logs - #792571 tidy: CVE-2015-5522 and CVE-2015-5523 Package: src:tidy; Maintainer for src:tidy is Tidy HTML5 <tidy-html5@packagesdebianorg>; Reported by: Alessandro Ghedini <ghedo@debianorg> Date: Thu, 16 Jul 2015 11:33:01 UTC Severity: important Tags: jessie, patch, security, sid, squeeze, stre ...
HTML Tidy could be made to crash or run programs if it processed specially crafted data ...
Fernando Muñoz discovered that invalid HTML input passed to tidy, an HTML syntax checker and reformatter, could trigger a buffer overflow This could allow remote attackers to cause a denial of service (crash) or potentially execute arbitrary code Geoff McLane also discovered that a similar issue could trigger an integer overflow, leading to a me ...