Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20007

Опубликовано: 26 дек. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mapcacheunfixedpackage
scilabfixed2024.1.0+dfsg1-1package
netcdffixed1:4.9.0-1package
netcdfignoredbullseyepackage
netcdfignoredbusterpackage
netcdfnot-affectedstretchpackage
netcdf-parallelfixed1:4.9.0-1package
netcdf-parallelignoredbullseyepackage
netcdf-parallelignoredbusterpackage

Примечания

  • https://sourceforge.net/p/ezxml/bugs/13/

  • mapcache only uses ezxml to parse config files which are trusted

EPSS

Процентиль: 74%
0.0085
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

CVSS3: 6.5
nvd
около 6 лет назад

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

github
больше 3 лет назад

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

CVSS3: 6.5
fstec
около 6 лет назад

Уязвимость функций ezxml_str2utf8, ezxml_parse_str компонента ezxml.c библиотеки для синтаксического анализа XML-документов ezXML, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
около 4 лет назад

Security update for netcdf

EPSS

Процентиль: 74%
0.0085
Низкий