Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24928

Опубликовано: 18 фев. 2025
Источник: redhat
CVSS3: 7.8

Описание

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.

Отчет

This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libxml2Affected
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle Supportlibxml2FixedRHSA-2025:267312.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update Supportlibxml2FixedRHSA-2025:265411.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicelibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionslibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:251310.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2346421libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
10 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
nvd
10 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
10 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buff ...

CVSS3: 7.8
github
10 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

7.8 High

CVSS3