6.5
CVSSv3

CVE-2019-20007

Published: 26/12/2019 Updated: 02/01/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in ezXML 0.8.2 up to and including 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ezxml project ezxml

Vendor Advisories

Debian Bug report logs - #989361 netcdf-parallel: Multiple security issues in ezxml Package: src:netcdf-parallel; Maintainer for src:netcdf-parallel is Alastair McKinstry <mckinstry@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 1 Jun 2021 19:57:04 UTC Severity: important Tags: security ...
Debian Bug report logs - #989360 netcdf: Multiple security issues in ezxml Package: src:netcdf; Maintainer for src:netcdf is Debian GIS Project <pkg-grass-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 1 Jun 2021 19:57:02 UTC Severity: important Tags: security Reply ...