First published: Thu Dec 26 2019(Updated: )
An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ezxml Project Ezxml | >=0.8.2<=0.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20007 is a vulnerability discovered in the ezXML library version 0.8.2 through 0.8.6.
The vulnerability CVE-2019-20007 in ezXML allows a crafted XML file to trigger a NULL pointer dereference, leading to a possible denial of service or arbitrary code execution.
CVE-2019-20007 has a severity level of medium with a CVSS score of 6.5.
To fix the vulnerability CVE-2019-20007, it is recommended to update ezXML to a version that is not affected, such as version 0.8.7 or newer.
You can find more information about CVE-2019-20007 on the SourceForge website at the following URL: https://sourceforge.net/p/ezxml/bugs/13/