Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
https://www.debian.org/security/2017/dsa-3952
https://source.android.com/security/bulletin/2017-06-01
https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
https://bugzilla.redhat.com/show_bug.cgi?id=1462216
https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
http://www.securitytracker.com/id/1038623
http://www.securityfocus.com/bid/98877
Source: Mitre, NVD
Published: 2018-02-19
Updated: 2024-11-21
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.39544