First published: Mon Jun 18 2018(Updated: )
A NULL pointer dereference vulnerability exists in the `xpath.c:xmlXPathCompOpEval()` function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the `XPATH_OP_AND` or `XPATH_OP_OR` case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/nokogiri | <1.8.5 | 1.8.5 |
redhat/libxml2 | <0:2.9.1-6.el7.4 | 0:2.9.1-6.el7.4 |
redhat/libxml2 | <0:2.9.7-7.el8 | 0:2.9.7-7.el8 |
redhat/cockpit-ovirt | <0:0.13.10-1.el7e | 0:0.13.10-1.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.9-2.el7e | 0:4.3.9-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.9-20200324.0.el7_8 | 0:4.3.9-20200324.0.el7_8 |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | ||
Xmlsoft Libxml2 | <=2.9.8 | |
redhat/libxml2 | <2.9.9 | 2.9.9 |
IBM ISAM | <=9.0.7 | |
IBM Security Verify Access | <=10.0.0 | |
debian/libxml2 | 2.9.10+dfsg-6.7+deb11u4 2.9.10+dfsg-6.7+deb11u5 2.9.14+dfsg-1.3~deb12u1 2.12.7+dfsg+really2.9.14-0.1 2.12.7+dfsg+really2.9.14-0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The CVE ID of this vulnerability is CVE-2018-14404.
The severity of CVE-2018-14404 is high with a CVSS score of 7.5.
The software affected by CVE-2018-14404 includes libxml2 version 2.9.8 and earlier, nokogiri version 1.8.5, and various versions of Ubuntu, Debian, Red Hat, IBM ISAM, and IBM Security Verify Access.
To fix CVE-2018-14404, you should update libxml2 to version 2.9.9 or later, or update the affected software or packages to the recommended versions provided by the respective vendors.
More information about CVE-2018-14404 can be found on the NIST National Vulnerability Database (NVD), Red Hat Security Advisory, and Debian bug report websites.