crouchr / learnage

0 stars 0 forks source link

CVE-2015-7499 (Medium) detected in clamav-develclamav-0.98.4 - autoclosed #202

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2015-7499 - Medium Severity Vulnerability

Vulnerable Library - clamav-develclamav-0.98.4

ClamAV Development - FAQ is here: https://github.com/Cisco-Talos/clamav-faq

Library home page: https://github.com/vrtadmin/clamav-devel.git

Found in HEAD commit: a5f2b4a6eb346dbe0def97e83877b169dc4b8f8c

Found in base branch: master

Vulnerable Source Files (3)

/blackrain2020/original-sources-3rd-party/clamav-0.98.4.tar/clamav-0.98.4/win32/3rdparty/libxml2/parser.c /blackrain2020/original-sources-3rd-party/clamav-0.98.4.tar/clamav-0.98.4/win32/3rdparty/libxml2/parser.c /blackrain2020/original-sources-3rd-party/clamav-0.98.4.tar/clamav-0.98.4/win32/3rdparty/libxml2/parser.c

Vulnerability Details

Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.

Publish Date: 2015-12-15

URL: CVE-2015-7499

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2015-7499

Release Date: 2015-12-15

Fix Resolution: 2.9.3


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 2 years ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.