In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2022-05-03 03:15
Updated : 2022-07-25 18:22
NVD link : CVE-2022-29824
Mitre link : CVE-2022-29824
JSON object : View
Products Affected
netapp
- manageability_software_development_kit
- clustered_data_ontap_antivirus_connector
- snapdrive
- active_iq_unified_manager
- snapmanager
- ontap_select_deploy_administration_utility
- hci_baseboard_management_controller
- smi-s_provider
- clustered_data_ontap
debian
- debian_linux
xmlsoft
- libxslt
- libxml2
fedoraproject
- fedora
CWE
CWE-190
Integer Overflow or Wraparound
