libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
References
| Link | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2017/05/15/1 | Exploit Mailing List Patch Third Party Advisory |
| http://www.securityfocus.com/bid/98556 | Third Party Advisory VDB Entry |
| http://www.debian.org/security/2017/dsa-3952 | |
| https://security.gentoo.org/glsa/201711-01 | |
| https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E |
Configurations
Information
Published : 2017-05-18 06:29
Updated : 2021-06-29 15:15
NVD link : CVE-2017-9048
Mitre link : CVE-2017-9048
JSON object : View
Products Affected
xmlsoft
- libxml2
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
