CVE-2020-12825
libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c
Severity Score
7.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.
libcroco versiones hasta 0.6.13, presenta una recursiĆ³n excesiva en la funciĆ³n cr_parser_parse_any_core en el archivo cr-parser.c, conllevando a un consumo de la pila.
A stack overflow flaw was found in libcroco. A service using libcroco's CSS parser could be crashed by a local, authenticated attacker, or an attacker utilizing social engineering, using a crafted input. The highest threat from this vulnerability is to system availability.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-05-12 CVE Reserved
- 2020-05-12 CVE Published
- 2024-01-28 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-674: Uncontrolled Recursion
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2020/09/08/3 | Mailing List |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2020/08/13/3 | 2024-08-04 | |
https://gitlab.gnome.org/GNOME/libcroco/-/issues/8 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202208-33 | 2022-10-27 | |
https://access.redhat.com/security/cve/CVE-2020-12825 | 2020-09-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1835377 | 2020-09-29 |