Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24928

Опубликовано: 18 фев. 2025
Источник: redhat
CVSS3: 7.8

Описание

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.

Отчет

This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libxml2Affected
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle Supportlibxml2FixedRHSA-2025:267312.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:268612.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update Supportlibxml2FixedRHSA-2025:265411.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update Servicelibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutionslibxml2FixedRHSA-2025:266011.03.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Supportlibxml2FixedRHSA-2025:251310.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2346421libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
nvd
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

CVSS3: 7.8
msrc
4 месяца назад

Описание отсутствует

CVSS3: 7.8
debian
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buff ...

CVSS3: 7.8
github
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

7.8 High

CVSS3