Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-6170

Опубликовано: 16 июн. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2unfixedpackage

Примечания

  • https://gitlab.gnome.org/GNOME/libxml2/-/issues/941

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 2%
0.00016
Низкий

Связанные уязвимости

CVSS3: 2.5
ubuntu
около 2 месяцев назад

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

CVSS3: 2.5
redhat
около 2 месяцев назад

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

CVSS3: 2.5
nvd
около 2 месяцев назад

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

CVSS3: 2.5
github
около 2 месяцев назад

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

EPSS

Процентиль: 2%
0.00016
Низкий