Количество 14
Количество 14
CVE-2017-9048
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
CVE-2017-9048
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
CVE-2017-9048
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
CVE-2017-9048
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buf ...
GHSA-rf96-7wvx-58w8
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
BDU:2022-07417
Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2017:1612-1
Security update for libxml2
SUSE-SU-2017:1587-1
Security update for libxml2
SUSE-SU-2017:1538-1
Security update for libxml2
openSUSE-SU-2017:1510-1
Security update for libxml2
SUSE-SU-2017:1557-1
Security update for libxml2
SUSE-SU-2017:1454-1
Security update for libxml2
SUSE-SU-2017:2699-1
Security update for SLES 12 Docker image
SUSE-SU-2017:2700-1
Security update for SLES 12-SP1 Docker image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-9048 libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. | CVSS3: 7.5 | 1% Низкий | больше 8 лет назад | |
CVE-2017-9048 libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. | CVSS3: 4.8 | 1% Низкий | больше 8 лет назад | |
CVE-2017-9048 libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. | CVSS3: 7.5 | 1% Низкий | больше 8 лет назад | |
CVE-2017-9048 libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buf ... | CVSS3: 7.5 | 1% Низкий | больше 8 лет назад | |
GHSA-rf96-7wvx-58w8 libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
BDU:2022-07417 Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 8 лет назад | |
openSUSE-SU-2017:1612-1 Security update for libxml2 | больше 8 лет назад | |||
SUSE-SU-2017:1587-1 Security update for libxml2 | больше 8 лет назад | |||
SUSE-SU-2017:1538-1 Security update for libxml2 | больше 8 лет назад | |||
openSUSE-SU-2017:1510-1 Security update for libxml2 | больше 8 лет назад | |||
SUSE-SU-2017:1557-1 Security update for libxml2 | больше 8 лет назад | |||
SUSE-SU-2017:1454-1 Security update for libxml2 | больше 8 лет назад | |||
SUSE-SU-2017:2699-1 Security update for SLES 12 Docker image | больше 8 лет назад | |||
SUSE-SU-2017:2700-1 Security update for SLES 12-SP1 Docker image | больше 8 лет назад |
Уязвимостей на страницу