Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24928

Опубликовано: 18 фев. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.

Отчет

This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libxml2Affected
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle Supportlibxml2FixedRHSA-2025:267312.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update Supportlibxml2FixedRHSA-2025:265411.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicelibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionslibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:251310.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2346421libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2

EPSS

Процентиль: 0%
0.00008
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
6 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
nvd
6 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
msrc
5 месяцев назад

Описание отсутствует

CVSS3: 7.8
debian
6 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buff ...

CVSS3: 7.8
github
6 месяцев назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

EPSS

Процентиль: 0%
0.00008
Низкий

7.8 High

CVSS3