First published: Mon Dec 10 2018(Updated: )
An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxml_write_node in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
mini-xml | =2.12 | |
Debian | =8.0 | |
Fedora | =28 | |
Fedora | =29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20004 is classified as a high severity vulnerability due to its potential for exploitation via stack-based buffer overflow.
To mitigate CVE-2018-20004, upgrade Mini-XML to version 2.12.1 or later, or apply any relevant patches provided by your distribution.
CVE-2018-20004 affects Mini-XML version 2.12, as well as Debian 8.0 and Fedora 28 and 29 distributions that use this version.
CVE-2018-20004 is a stack-based buffer overflow vulnerability that can occur in the mxml_write_node function.
Exploitation of CVE-2018-20004 could allow an attacker to execute arbitrary code or crash the application, leading to denial of service.