Vulnerability Name: | CVE-2020-25713 (CCN-191762) | ||||||||||||||||||||||||||||
Assigned: | 2020-11-13 | ||||||||||||||||||||||||||||
Published: | 2020-11-13 | ||||||||||||||||||||||||||||
Updated: | 2022-10-21 | ||||||||||||||||||||||||||||
Summary: | A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
4.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
5.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-125 CWE-125 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-25713 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros Source: MISC Type: Issue Tracking, Patch, Vendor Advisory https://bugs.librdf.org/mantis/view.php?id=650 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1900685 Source: XF Type: UNKNOWN raptor-cve202025713-dos(191762) Source: CCN Type: raptor GIT Repository Raptor RDF Syntax Library Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211214 [SECURITY] [DLA 2846-1] raptor2 security update Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-8fe81dcf9f Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-5752e07eb6 Source: CCN Type: oss-sec Mailing List, Mon, 16 Nov 2020 12:43:18 +0100 Re: Buffer Overflow in raptor widely unfixed in Linux distros | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |