A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
References
Link | Resource |
---|---|
https://gitlab.gnome.org/GNOME/libxml2/issues/10 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1595985 | Issue Tracking Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3739-2/ | Third Party Advisory |
https://usn.ubuntu.com/3739-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html | |
https://access.redhat.com/errata/RHSA-2019:1543 | |
https://security.netapp.com/advisory/ntap-20190719-0002/ | |
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-07-19 06:29
Updated : 2020-09-09 18:15
NVD link : CVE-2018-14404
Mitre link : CVE-2018-14404
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
xmlsoft
- libxml2