8.8
CVSSv3

CVE-2017-5130

Published: 07/02/2018 Updated: 08/04/2022
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An integer overflow in xmlmemory.c in libxml2 prior to 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote malicious user to potentially exploit heap corruption via a crafted XML file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google chrome

debian debian linux 9.0

debian debian linux 8.0

xmlsoft libxml2

Vendor Advisories

Synopsis Important: chromium-browser security update Type/Severity Security Advisory: Important Topic An update for chromium-browser is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Debian Bug report logs - #880000 libxml2: CVE-2017-5130 Package: src:libxml2; Maintainer for src:libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 28 Oct 2017 08:03:04 UTC Severity: important Tags: patch, security, upstrea ...
Debian Bug report logs - #855001 CVE-2017-5969: libxml2: null pointer dereference when parsing a xml file using recover mode Package: libxml2; Maintainer for libxml2 is Debian XML/SGML Group <debian-xml-sgml-pkgs@listsaliothdebianorg>; Source for libxml2 is src:libxml2 (PTS, buildd, popcon) Reported by: Henri Salo <hen ...
A heap overflow security issue has been found in libxml2 ...