Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
10.0CRITICAL
EPSS
56.6%
top 1.87%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedSep 12
Latest updateMay 2

Description

Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages5 packages

NVDxmlsoft/libxml2< 2.7.0
Debianlibxml2< 2.6.32.dfsg-4+3
NVDapple/safari3.2.03.2.3+1
NVDapple/mac_os_x< 10.5.7+1
NVDapple/iphone_os< 3.0

Also affects: Debian Linux 4.0, Ubuntu Linux 6.06, 7.04, 7.10, 8.04, 8.10, 9.04

🔴Vulnerability Details

3
GHSA
GHSA-vgv6-63x3-fm4w: Heap-based buffer overflow in the xmlParseAttValueComplex function in parser2022-05-02
OSV
CVE-2008-3529: Heap-based buffer overflow in the xmlParseAttValueComplex function in parser2008-09-12
CVEList
CVE-2008-3529: Heap-based buffer overflow in the xmlParseAttValueComplex function in parser2008-09-12

💥Exploits & PoCs

1
Exploit-DB
Apple Safari - RSS 'feed://' Buffer Overflow via libxml2 (PoC)2009-05-26

📋Vendor Advisories

4
Ubuntu
libxml2 vulnerabilities2009-08-11
Ubuntu
libxml2 vulnerabilities2008-09-11
Red Hat
libxml2: long entity name heap buffer overflow2008-09-11
Debian
CVE-2008-3529: libxml2 - Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c i...2008

💬Community

1
Bugzilla
CVE-2008-3529 libxml2: long entity name heap buffer overflow2008-09-03
CVE-2008-3529 (CRITICAL CVSS 10) | Heap-based buffer overflow in the x | cvebase.io