Severity
7.5HIGH
EPSS
0.6%
top 30.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 18
Latest updateMay 13

Description

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Debianlibxml2< 2.9.4+dfsg1-3.1+3
NVDxmlsoft/libxml22.9.4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rf96-7wvx-58w8: libxml2 20904-GITv22022-05-13
CVEList
CVE-2017-9048: libxml2 20904-GITv22017-05-18
OSV
CVE-2017-9048: libxml2 20904-GITv22017-05-18

📋Vendor Advisories

4
Ubuntu
libxml2 vulnerabilities2017-10-10
Ubuntu
libxml2 vulnerabilities2017-09-19
Red Hat
libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent2017-05-15
Debian
CVE-2017-9048: libxml2 - libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overfl...2017

💬Community

3
Bugzilla
CVE-2017-9048 libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent2017-05-19
Bugzilla
CVE-2017-9047 CVE-2017-9048 CVE-2017-9049 CVE-2017-9050 mingw-libxml2: various flaws [fedora-all]2017-05-19
Bugzilla
CVE-2017-9047 CVE-2017-9048 CVE-2017-9049 CVE-2017-9050 libxml2: various flaws [fedora-all]2017-05-19
CVE-2017-9048 (HIGH CVSS 7.5) | libxml2 20904-GITv2.9.4-16-g0741801 | cvebase.io