Vulnerability Name: | CVE-2022-2309 (CCN-230470) |
Assigned: | 2022-06-18 |
Published: | 2022-06-18 |
Updated: | 2022-10-28 |
Summary: | NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered. |
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) 4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low | 7.5 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-476
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2022-2309
Source: XF Type: UNKNOWN libxml2-cve20222309-dos(230470)
Source: CCN Type: lxml GIT Repository Fix a crash when incorrect parser input occurs together with usages of iterwalk() on trees generated by the same parser.
Source: MISC Type: Patch, Third Party Advisory https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f
Source: CONFIRM Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
Source: CCN Type: huntr Web site NULL Pointer Dereference in function _appendStartNsEvents in lxml/lxml
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-ed17f59c1d
Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-ed0eeb6a20
Source: GENTOO Type: Third Party Advisory GLSA-202208-06
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20220915-0006/
|
Vulnerable Configuration: | Configuration 1: cpe:/a:lxml:lxml:*:*:*:*:*:*:*:* (Version < 4.9.1)AND cpe:/a:xmlsoft:libxml2:*:*:*:*:*:*:*:* (Version >= 2.9.10 and <= 2.9.14) Configuration 2: cpe:/o:fedoraproject:fedora:36:*:*:*:*:*:*:*OR Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 3: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 4: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 5: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 6: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 7: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 8: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 9: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 10: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 11: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 12: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 13: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 14: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 15: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 16: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 17: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 18: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 19: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 20: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 21: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 22: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 23: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 24: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 25: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 26: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 27: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 28: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 29: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 30: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 31: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 32: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 33: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 34: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 35: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 36: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 37: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 38: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 39: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 40: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 41: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 42: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration RedHat 43: cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:* Configuration RedHat 44: cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:xmlsoft:libxml2:2.9.10:-:*:*:*:*:*:*OR cpe:/a:xmlsoft:libxml2:2.9.9:-:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |