← Voltar para CVEs
CVE-2020-7595
HIGH7.5
Descricao
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
Detalhes CVE
Pontuacao CVSS v3.17.5
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado1/21/2020
Ultima modificacao12/3/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoranetapp:clustered_data_ontapnetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:smi-s_providernetapp:snapdrivenetapp:steelstore_cloud_integrated_storagenetapp:symantec_netbackuporacle:communications_cloud_native_core_network_function_cloud_native_environmentoracle:enterprise_manager_base_platformoracle:enterprise_manager_ops_centeroracle:mysql_workbenchoracle:peoplesoft_enterprise_peopletoolsoracle:real_user_experience_insightsiemens:sinema_remote_connect_serverxmlsoft:libxml2
Fraquezas (CWE)
CWE-835CWE-835
Referencias
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/(cve@mitre.org)
https://security.gentoo.org/glsa/202010-04(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20200702-0005/(cve@mitre.org)
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08(cve@mitre.org)
https://usn.ubuntu.com/4274-1/(cve@mitre.org)
https://www.oracle.com/security-alerts/cpuapr2022.html(cve@mitre.org)
https://www.oracle.com/security-alerts/cpujul2020.html(cve@mitre.org)
https://www.oracle.com/security-alerts/cpujul2022.html(cve@mitre.org)
https://www.oracle.com/security-alerts/cpuoct2021.html(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202010-04(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200702-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4274-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.