Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-29824

Опубликовано: 03 мая 2022
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

A flaw was found in the libxml2 library in functions used to manipulate the xmlBuf and the xmlBuffer types. A substantial input causes values to calculate buffer sizes to overflow, resulting in an out-of-bounds write.

Меры по смягчению последствий

Avoid passing large inputs to the libxml2 library.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7libxml2Will not fix
Red Hat Enterprise Linux 8libxml2FixedRHSA-2022:531730.06.2022
Red Hat Enterprise Linux 8libxml2FixedRHSA-2022:531730.06.2022
Red Hat Enterprise Linux 9libxml2FixedRHSA-2022:525001.07.2022
Red Hat Enterprise Linux 9libxml2FixedRHSA-2022:525001.07.2022
Text-Only JBCSlibxml2FixedRHSA-2022:884108.12.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2082158libxml2: integer overflows in xmlBuf and xmlBuffer lead to out-of-bounds write

EPSS

Процентиль: 12%
0.00041
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

CVSS3: 6.5
nvd
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

CVSS3: 6.5
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 6.5
debian
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c ( ...

CVSS3: 6.5
github
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

EPSS

Процентиль: 12%
0.00041
Низкий

7.4 High

CVSS3