An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 03:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://bugzilla.gnome.org/show_bug.cgi?id=783026 - Issue Tracking | |
| References | () http://www.securityfocus.com/bid/101482 - Third Party Advisory, VDB Entry | |
| References | () https://access.redhat.com/errata/RHSA-2017:2997 - Third Party Advisory | |
| References | () https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html - Vendor Advisory | |
| References | () https://crbug.com/722079 - Third Party Advisory | |
| References | () https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2017/11/msg00034.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html - | |
| References | () https://security.gentoo.org/glsa/201710-24 - Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20190719-0001/ - | |
| References | () https://www.oracle.com/security-alerts/cpuapr2020.html - | 
08 Apr 2022, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
Information
                Published : 2018-02-07 23:29
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5130
Mitre link : CVE-2017-5130
CVE.ORG link : CVE-2017-5130
JSON object : View
Products Affected
                xmlsoft
- libxml2
 
debian
- debian_linux
 
- chrome
 
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
