CVE-2019-20006Use After Free in Project Ezxml

CWE-416Use After Free4 documents4 sources
Severity
7.5HIGHNVD
EPSS
0.4%
top 36.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 26
Latest updateMay 24

Description

An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDezxml_project/ezxml0.8.30.8.6
debiandebian/netcdf< netcdf 1:4.9.0-1 (bookworm)
debiandebian/scilab< netcdf 1:4.9.0-1 (bookworm)
debiandebian/mapcache< netcdf 1:4.9.0-1 (bookworm)
debiandebian/netcdf-parallel< netcdf 1:4.9.0-1 (bookworm)

🔴Vulnerability Details

2
GHSA
GHSA-2mjx-47r7-xrpj: An issue was discovered in ezXML 02022-05-24
OSV
CVE-2019-20006: An issue was discovered in ezXML 02019-12-26

📋Vendor Advisories

1
Debian
CVE-2019-20006: mapcache - An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_co...2019
CVE-2019-20006 — Use After Free in Ezxml Project Ezxml | cvebase