{
  "threat_severity" : "Critical",
  "public_date" : "2015-05-12T00:00:00Z",
  "bugzilla" : {
    "description" : "expat: Integer overflow leading to buffer overflow in XML_GetBuffer()",
    "id" : "1220607",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1220607"
  },
  "cvss" : {
    "cvss_base_score" : "6.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "details" : [ "Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283." ],
  "statement" : "This issue affects the version of expat package as shipped with Red Hat Enterprise Linux 5, 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact, a future update may address this flaw.\nRed Hat Enterprise Linux 5 is now in Extended Life Cycle phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates.",
  "acknowledgement" : "Red Hat would like to thank Mozilla project for reporting this issue. Upstream acknowledges Ucha Gobejishvili as the original reporter.",
  "affected_release" : [ {
    "product_name" : "Red Hat Ansible Tower 3.5 for RHEL 7",
    "release_date" : "2020-04-22T00:00:00Z",
    "advisory" : "RHBA-2020:1539",
    "cpe" : "cpe:/a:redhat:ansible_tower:3.5::el7",
    "package" : "ansible-tower-35/ansible-tower:3.5.6-1"
  }, {
    "product_name" : "Red Hat Ansible Tower 3.6 for RHEL 7",
    "release_date" : "2020-04-22T00:00:00Z",
    "advisory" : "RHBA-2020:1540",
    "cpe" : "cpe:/a:redhat:ansible_tower:3.6::el7",
    "package" : "ansible-tower-36/ansible-tower:3.6.4-1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2015-05-12T00:00:00Z",
    "advisory" : "RHSA-2015:0988",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "firefox-0:38.0-4.el5_11"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2015-05-18T00:00:00Z",
    "advisory" : "RHSA-2015:1012",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "thunderbird-0:31.7.0-1.el5_11",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2015-05-12T00:00:00Z",
    "advisory" : "RHSA-2015:0988",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "firefox-0:38.0-4.el6_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2015-05-18T00:00:00Z",
    "advisory" : "RHSA-2015:1012",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "thunderbird-0:31.7.0-1.el6_6",
    "impact" : "important"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-05-12T00:00:00Z",
    "advisory" : "RHSA-2015:0988",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "firefox-0:38.0-3.el7_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2015-05-18T00:00:00Z",
    "advisory" : "RHSA-2015:1012",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "thunderbird-0:31.7.0-1.ael7b_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2020-03-31T00:00:00Z",
    "advisory" : "RHSA-2020:1011",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "expat-0:2.1.0-11.el7",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.7 Extended Update Support",
    "release_date" : "2020-06-12T00:00:00Z",
    "advisory" : "RHSA-2020:2508",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.7",
    "package" : "expat-0:2.1.0-11.el7_7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "expat",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "impact" : "moderate"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "expat",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "impact" : "moderate"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2015-2716\nhttps://nvd.nist.gov/vuln/detail/CVE-2015-2716\nhttp://www.mozilla.org/security/announce/2015/mfsa2015-54.html" ],
  "name" : "CVE-2015-2716",
  "csaw" : false
}