First published: Sun Dec 30 2018(Updated: )
In Mini-XML (aka mxml) v2.12, there is a use-after-free in the mxmlAdd function of the mxml-node.c file. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted xml file, as demonstrated by mxmldoc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
msweet Mini-XML | =2.12 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20592 is classified as a high severity vulnerability due to its potential to cause denial-of-service attacks.
To fix CVE-2018-20592, you should update Mini-XML to version 2.12 or later where the vulnerability has been addressed.
CVE-2018-20592 affects systems running Mini-XML version 2.12 as well as specific versions of Fedora, namely 28 and 29.
Attackers can exploit CVE-2018-20592 by sending crafted XML files that trigger the use-after-free condition.
Mini-XML is a small XML parsing library, and CVE-2018-20592 represents a critical vulnerability within its mxmlAdd function.