Lucene search

K
prionPRIOn knowledge basePRION:CVE-2017-9047
HistoryMay 18, 2017 - 6:29 a.m.

Buffer overflow

2017-05-1806:29:00
PRIOn knowledge base
www.prio-n.com
8

8.3 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.2%

A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer โ€˜bufโ€™ of size โ€˜sizeโ€™. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses โ€˜lenโ€™ rather than the updated buffer length strlen(buf). This allows us to write about โ€œsizeโ€ many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.

CPENameOperatorVersion
libxml2eq2.9.4