Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20006

Опубликовано: 26 дек. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mapcacheunfixedpackage
scilabfixed2024.1.0+dfsg1-1package
netcdffixed1:4.9.0-1package
netcdfignoredbullseyepackage
netcdfignoredbusterpackage
netcdfnot-affectedstretchpackage
netcdf-parallelfixed1:4.9.0-1package
netcdf-parallelignoredbullseyepackage
netcdf-parallelignoredbusterpackage

Примечания

  • https://sourceforge.net/p/ezxml/bugs/15/

  • mapcache only uses ezxml to parse config files which are trusted

EPSS

Процентиль: 62%
0.00436
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.

CVSS3: 7.5
nvd
около 6 лет назад

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.

github
больше 3 лет назад

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость функции ezxml_char_content библиотеки для синтаксического анализа XML-документов ezXML, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
около 4 лет назад

Security update for netcdf

EPSS

Процентиль: 62%
0.00436
Низкий