| Vulnerability Name: | CVE-2018-20004 (CCN-154101) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-12-10 | ||||||||||||||||||||||||||||||||||||
| Published: | 2018-12-10 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2020-08-24 | ||||||||||||||||||||||||||||||||||||
| Summary: | An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-20004 Source: XF Type: UNKNOWN minixml-cve201820004-dos(154101) Source: CCN Type: GitHub Web site Stack-buffer-overflow in Function mxml_write_node Source: MISC Type: Exploit, Third Party Advisory https://github.com/fouzhe/security/tree/master/mxml#stack-buffer-overflow-in-function-mxml_write_node Source: CCN Type: mxml GIT Repository Mini-XML Source: MISC Type: Exploit, Third Party Advisory https://github.com/michaelrsweet/mxml/issues/233 Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20190125 [SECURITY] [DLA 1641-1] mxml security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-d333d01e08 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-f99619e34d | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||