Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-25062

Опубликовано: 04 фев. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

A use-after-free flaw was found in libxml2. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

Отчет

The severity of this vulnerability is not important but moderate due to the lack of impact to both confidentiality and integrity, but potential impact to availability. The theoretical risk of impact to availability is limited due to the specific requirement that applications must continue to misuse the reader API after it has already reported validation errors instead of handling those errors. The flaw requires that crafted XML documents can be provided by an attacker and the utilization of DTD validation and XInclude expansion using the XMLReader API. Along with those conditions, the application using the XMLReader API must be ignoring errors when expanding invalid XInclude nodes in an maliciously crafted document. These conditions are unlikely to exist in the intended usage of the XMLReader API.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7libxml2Out of support scope
Red Hat Satellite 6puppet-agentAffected
Red Hat Enterprise Linux 8libxml2FixedRHSA-2024:362605.06.2024
Red Hat Enterprise Linux 8libxml2FixedRHSA-2024:362605.06.2024
Red Hat Enterprise Linux 8.6 Extended Update Supportlibxml2FixedRHSA-2024:329922.05.2024
Red Hat Enterprise Linux 8.8 Extended Update Supportlibxml2FixedRHSA-2024:330323.05.2024
Red Hat Enterprise Linux 9libxml2FixedRHSA-2024:267902.05.2024
Red Hat Enterprise Linux 9libxml2FixedRHSA-2024:267902.05.2024
Red Hat Enterprise Linux 9.2 Extended Update Supportlibxml2FixedRHSA-2024:362505.06.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2262726libxml2: use-after-free in XMLReader

EPSS

Процентиль: 37%
0.0015
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

CVSS3: 7.5
nvd
больше 1 года назад

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

CVSS3: 7.5
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
больше 1 года назад

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.1 ...

suse-cvrf
около 1 года назад

Security update for libxml2

EPSS

Процентиль: 37%
0.0015
Низкий

7.5 High

CVSS3