CVE-2019-20005
openSUSE Security Advisory - openSUSE-SU-2021:3804-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing a crafted XML file, performs incorrect memory handling, leading to a heap-based buffer over-read while running strchr() starting with a pointer after a '\0' character (where the processing of a string was finished).
Se detectó un problema en ezXML versiones 0.8.3 hasta 0.8.6. La función ezxml_decode, mientras analiza un archivo XML diseñado, realiza un manejo incorrecto de la memoria, conllevando a una lectura excesiva del búfer en la región heap de la memoria mientras se ejecuta strchr() comenzando con un puntero después de un carácter "\0" (donde el procesamiento de una cadena fue terminado).
An update that fixes 16 vulnerabilities is now available. This update for netcdf fixes the following issues.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-26 CVE Reserved
- 2019-12-26 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-04-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://sourceforge.net/p/ezxml/bugs/14 | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ezxml Project Search vendor "Ezxml Project" | Ezxml Search vendor "Ezxml Project" for product "Ezxml" | >= 0.8.3 <= 0.8.6 Search vendor "Ezxml Project" for product "Ezxml" and version " >= 0.8.3 <= 0.8.6" | - |
Affected
|