Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-49796

Опубликовано: 11 июн. 2025
Источник: redhat
CVSS3: 9.1
EPSS Низкий

Описание

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

Отчет

The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).

Меры по смягчению последствий

There's no available mitigation other than to avoid processing untrusted XML documents before updating to the libxml version containing the fix.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7libxml2Affected
Red Hat JBoss Core Serviceslibxml2Affected
Red Hat Enterprise Linux 10libxml2FixedRHSA-2025:1063008.07.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:1069809.07.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:1069809.07.2025
Red Hat Enterprise Linux 9libxml2FixedRHSA-2025:1069909.07.2025
Red Hat Enterprise Linux 9libxml2FixedRHSA-2025:1069909.07.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=2372385libxml: Type confusion leads to Denial of service (DoS)

EPSS

Процентиль: 27%
0.00094
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
около 2 месяцев назад

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVSS3: 9.1
nvd
около 2 месяцев назад

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVSS3: 9.1
debian
около 2 месяцев назад

A vulnerability was found in libxml2. Processing certain sch:name elem ...

CVSS3: 9.1
github
около 2 месяцев назад

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVSS3: 9.1
fstec
2 месяца назад

Уязвимость функции xmlSchematronFormatReport() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 27%
0.00094
Низкий

9.1 Critical

CVSS3