NULL Pointer Dereference

Affecting libxml2 package, versions <2.9.4+dfsg1-7+deb10u1

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.

References

CVSS Score

7.5
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    None
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE
CVE-2018-14404
CWE
CWE-476
Snyk ID
SNYK-DEBIAN10-LIBXML2-429565
Disclosed
19 Jul, 2018
Published
22 Jul, 2018