Vulnerability Name: | CVE-2018-20004 (CCN-154101) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-12-10 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-12-10 | ||||||||||||||||||||||||||||||||||||
Updated: | 2020-08-24 | ||||||||||||||||||||||||||||||||||||
Summary: | An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-20004 Source: XF Type: UNKNOWN minixml-cve201820004-dos(154101) Source: CCN Type: GitHub Web site Stack-buffer-overflow in Function mxml_write_node Source: MISC Type: Exploit, Third Party Advisory https://github.com/fouzhe/security/tree/master/mxml#stack-buffer-overflow-in-function-mxml_write_node Source: CCN Type: mxml GIT Repository Mini-XML Source: MISC Type: Exploit, Third Party Advisory https://github.com/michaelrsweet/mxml/issues/233 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-d333d01e08 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-f99619e34d | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |