CVE-2018-14404
libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
Existe una vulnerabilidad de desreferencia de puntero NULL en la función xpath.c:xmlXPathCompOpEval() de libxml2 hasta la versión 2.9.8 al analizar una expresión XPath inválida en los casos XPATH_OP_AND o XPATH_OP_OR. Las aplicaciones que procesan entradas de formato XLS no fiables mediante la biblioteca libxml2 podrían ser vulnerables a un ataque de denegación de servicio (DoS) debido al cierre inesperado de la aplicación.
A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-07-19 CVE Reserved
- 2018-07-19 CVE Published
- 2024-05-03 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 | Mailing List | |
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20190719-0002 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:1543 | 2020-09-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1595985 | 2020-04-28 | |
https://gitlab.gnome.org/GNOME/libxml2/issues/10 | 2020-09-10 | |
https://usn.ubuntu.com/3739-1 | 2020-09-10 | |
https://usn.ubuntu.com/3739-2 | 2020-09-10 | |
https://access.redhat.com/security/cve/CVE-2018-14404 | 2020-04-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | - | - |
Affected
| ||||||
Xmlsoft Search vendor "Xmlsoft" | Libxml2 Search vendor "Xmlsoft" for product "Libxml2" | <= 2.9.8 Search vendor "Xmlsoft" for product "Libxml2" and version " <= 2.9.8" | - |
Affected
|