Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24928

Опубликовано: 18 фев. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.

Отчет

This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 10libxml2FixedRHBA-2025:659713.05.2025
Red Hat Enterprise Linux 7 Extended Lifecycle Supportlibxml2FixedRHSA-2025:267312.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update Supportlibxml2FixedRHSA-2025:265411.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicelibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionslibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:251310.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2346421libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2

EPSS

Процентиль: 46%
0.00235
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 1 года назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
nvd
около 1 года назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
msrc
около 1 года назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
debian
около 1 года назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buff ...

CVSS3: 7.8
github
около 1 года назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

EPSS

Процентиль: 46%
0.00235
Низкий

7.8 High

CVSS3