CVE-2019-20007NULL Pointer Dereference in Project Ezxml

Severity
6.5MEDIUMNVD
EPSS
0.9%
top 25.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 26
Latest updateMay 24

Description

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

NVDezxml_project/ezxml0.8.20.8.6
debiandebian/netcdf< netcdf 1:4.9.0-1 (bookworm)
debiandebian/scilab< netcdf 1:4.9.0-1 (bookworm)
debiandebian/mapcache< netcdf 1:4.9.0-1 (bookworm)
debiandebian/netcdf-parallel< netcdf 1:4.9.0-1 (bookworm)

🔴Vulnerability Details

2
GHSA
GHSA-27qv-mw67-9whg: An issue was discovered in ezXML 02022-05-24
OSV
CVE-2019-20007: An issue was discovered in ezXML 02019-12-26

📋Vendor Advisories

1
Debian
CVE-2019-20007: mapcache - An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf...2019
CVE-2019-20007 — NULL Pointer Dereference | cvebase