Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-9048

Опубликовано: 18 мая 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.

РелизСтатусПримечание
devel

not-affected

2.9.4+dfsg1-3.1
esm-infra-legacy/trusty

released

2.9.1+dfsg1-3ubuntu4.10
esm-infra/xenial

released

2.9.3+dfsg1-1ubuntu0.3
precise/esm

not-affected

2.7.8.dfsg-5.1ubuntu4.18
trusty

released

2.9.1+dfsg1-3ubuntu4.10
trusty/esm

released

2.9.1+dfsg1-3ubuntu4.10
upstream

released

2.9.4+dfsg1-3.1, 2.9.5
vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

DNE

xenial

released

2.9.3+dfsg1-1ubuntu0.3

Показывать по

EPSS

Процентиль: 67%
0.00537
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 4.8
redhat
больше 8 лет назад

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.

CVSS3: 7.5
nvd
больше 8 лет назад

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.

CVSS3: 7.5
debian
больше 8 лет назад

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buf ...

CVSS3: 7.5
github
больше 3 лет назад

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.

CVSS3: 7.5
fstec
больше 8 лет назад

Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 67%
0.00537
Низкий

5 Medium

CVSS2

7.5 High

CVSS3