In Mini-XML (aka mxml) v2.12, there is a use-after-free in the mxmlAdd function of the mxml-node.c file. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted xml file, as demonstrated by mxmldoc.
References
Link | Resource |
---|---|
https://github.com/ntu-sec/pocs/blob/master/mxml-53c75b0/crashes/uaf_mxml-node.c:128_2.txt.err | Exploit Third Party Advisory |
https://github.com/ntu-sec/pocs/blob/master/mxml-53c75b0/crashes/uaf_mxml-node.c:128_1.txt.err | Exploit Third Party Advisory |
https://github.com/michaelrsweet/mxml/issues/237 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N53IJHDYR5HVQLKH4J6B27OEQLGKSGY5/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNWF6BAU7S42O4LE4B74KIMHFE2HDNMI/ | Mailing List Third Party Advisory |
Information
Published : 2018-12-30 10:29
Updated : 2019-04-03 06:36
NVD link : CVE-2018-20592
Mitre link : CVE-2018-20592
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
msweet
- mini-xml
fedoraproject
- fedora