Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6021

Опубликовано: 12 июн. 2025
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Отчет

This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it’s a write overflow, modern mitigations make remote code execution unlikely.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7libxml2Affected
Red Hat JBoss Core Serviceslibxml2Affected
Red Hat OpenShift Container Platform 4rhcosAffected
Red Hat Enterprise Linux 10libxml2FixedRHSA-2025:1063008.07.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:1069809.07.2025
Red Hat Enterprise Linux 8libxml2FixedRHSA-2025:1069809.07.2025
Red Hat Enterprise Linux 9libxml2FixedRHSA-2025:1069909.07.2025
Red Hat Enterprise Linux 9libxml2FixedRHSA-2025:1069909.07.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2372406libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2

EPSS

Процентиль: 41%
0.00183
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
nvd
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
debian
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer ov ...

CVSS3: 7.5
github
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
fstec
около 2 месяцев назад

Уязвимость функции xmlBuildQName библиотеки Libxml2, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 41%
0.00183
Низкий

7.5 High

CVSS3