There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
|
Information
Published : 2021-05-19 14:15
Updated : 2022-07-25 18:16
NVD link : CVE-2021-3517
Mitre link : CVE-2021-3517
JSON object : View
Products Affected
redhat
- jboss_core_services
- enterprise_linux
netapp
- snapdrive
- hci_management_node
- snapmanager
- ontap_select_deploy_administration_utility
- santricity_unified_manager
- e-series_santricity_storage_manager
- active_iq_unified_manager
- solidfire
- e-series_santricity_web_services
- oncommand_workflow_automation
- e-series_santricity_os_controller
- oncommand_insight
- manageability_software_development_kit
- clustered_data_ontap_antivirus_connector
- hci_h410c
- hci_h410c_firmware
- clustered_data_ontap
debian
- debian_linux
fedoraproject
- fedora
xmlsoft
- libxml2
oracle
- mysql_workbench
- zfs_storage_appliance_kit
- real_user_experience_insight
- openjdk
CWE
CWE-787
Out-of-bounds Write
