CVE-2015-7995

Summary

CVECVE-2015-7995
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2015-11-17 15:59:00 UTC
Updated2019-03-08 16:06:00 UTC
DescriptionThe xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Apple Iphone Os All All All All
Operating System Apple Mac Os X All All All All
Operating System Apple Tvos All All All All
Operating System Apple Watchos All All All All
Application Xmlsoft Libxslt All All All All

References

ReferenceSourceLinkTags
APPLE-SA-2016-03-21-2 watchOS 2.2 APPLE lists.apple.com
Bug 1257962 – CVE-2015-7995 libxslt: Type confusion may cause DoS CONFIRM bugzilla.redhat.com Exploit
CVE-2015-7995 - libxslt vulnerability | Puppet CONFIRM puppet.com
libxslt 'libxslt/preproc.c' Type Confusion Remote Denial of Service Vulnerability BID www.securityfocus.com
About the security content of tvOS 9.1.1 - Apple Support CONFIRM support.apple.com
About the security content of iOS 9.2.1 - Apple Support CONFIRM support.apple.com
libxslt - XSLT transformation library CONFIRM git.gnome.org
APPLE-SA-2016-01-19-1 iOS 9.2.1 APPLE lists.apple.com Vendor Advisory
About the security content of OS X El Capitan 10.11.3 and Security Update 2016-001 - Apple Support CONFIRM support.apple.com
About the security content of watchOS 2.2 - Apple Support CONFIRM support.apple.com Vendor Advisory
openSUSE-SU-2016:1439-1: moderate: Security update for libxslt SUSE lists.opensuse.org
APPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update 2016-001 APPLE lists.apple.com Vendor Advisory
oss-security - CVE request: libxslt xsltStylePreCompute() type confusion DoS MLIST www.openwall.com
APPLE-SA-2016-01-25-1 tvOS 9.1.1 APPLE lists.apple.com Vendor Advisory
Debian -- Security Information -- DSA-3605-1 libxslt DEBIAN www.debian.org
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
oss-security - Re: CVE request: libxslt xsltStylePreCompute() type confusion DoS MLIST www.openwall.com
Google Android Multiple Flaws Let Remote Users Deny Service, Obtain Potentially Sensitive Information, and Execute Arbitrary Code and Let Local Apps Gain Elevated Privileges - SecurityTracker SECTRACK www.securitytracker.com
Apple OS X Multiple Memory Corruption Flaws Lets Local Users Obtain Root Privileges - SecurityTracker SECTRACK www.securitytracker.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
The Slackware Linux Project: Slackware Security Advisories SLACKWARE www.slackware.com
Oracle Solaris Bulletin - January 2016 CONFIRM www.oracle.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 296087 Oracle Solaris 11.4 Support Repository Update (SRU) 8.1.5 Missing (CPUAPR2019)
  • 375442 HPE System Management Homepage Multiple Vulnerabilities (HPESBMU03593)
  • 378509 Splunk Enterprise Multiple Vulnerabilities (SP-CAAAPKV)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report