Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20007

Опубликовано: 26 дек. 2019
Источник: debian

Описание

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mapcacheunfixedpackage
scilabunfixedpackage
netcdffixed1:4.9.0-1package
netcdfignoredbullseyepackage
netcdfignoredbusterpackage
netcdfnot-affectedstretchpackage
netcdf-parallelfixed1:4.9.0-1package
netcdf-parallelignoredbullseyepackage
netcdf-parallelignoredbusterpackage

Примечания

  • https://sourceforge.net/p/ezxml/bugs/13/

  • mapcache only uses ezxml to parse config files which are trusted

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 6 лет назад

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

CVSS3: 6.5
nvd
почти 6 лет назад

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

github
больше 3 лет назад

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

CVSS3: 6.5
fstec
почти 6 лет назад

Уязвимость функций ezxml_str2utf8, ezxml_parse_str компонента ezxml.c библиотеки для синтаксического анализа XML-документов ezXML, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
почти 4 года назад

Security update for netcdf