Executive Summary
Summary | |
---|---|
Title | tidy security update |
Informations | |||
---|---|---|---|
Name | DSA-3309 | First vendor Publication | 2015-07-18 |
Vendor | Debian | Last vendor Modification | 2015-07-18 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Fernando Muñoz discovered that invalid HTML input passed to tidy, an HTML syntax checker and reformatter, could trigger a buffer overflow. This could allow remote attackers to cause a denial of service (crash) or potentially execute arbitrary code. Geoff McLane also discovered that a similar issue could trigger an integer overflow, leading to a memory allocation of 4GB. This could allow remote attackers to cause a denial of service by saturating the target's memory. For the oldstable distribution (wheezy), these problems have been fixed in version 20091223cvs-1.2+deb7u1. For the stable distribution (jessie), these problems have been fixed in version 20091223cvs-1.4+deb8u1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your tidy packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3309 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-09-24 | IAVM : 2015-A-0222 - Multiple Security Vulnerabilities in Apple iOS Severity : Category I - VMSKEY : V0061471 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-10-05 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_11.nasl - Type : ACT_GATHER_INFO |
2015-09-11 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-1525-1.nasl - Type : ACT_GATHER_INFO |
2015-07-30 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2695-1.nasl - Type : ACT_GATHER_INFO |
2015-07-20 | Name : The remote Debian host is missing a security update. File : debian_DLA-273.nasl - Type : ACT_GATHER_INFO |
2015-07-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3309.nasl - Type : ACT_GATHER_INFO |
2015-06-09 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_bd1ab7a50e0111e59976a0f3c100ae18.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-08-12 00:30:28 |
|
2015-08-11 21:27:21 |
|
2015-07-24 13:29:58 |
|
2015-07-18 21:25:43 |
|