First published: Tue Dec 31 2019(Updated: )
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing a crafted XML file, performs incorrect memory handling, leading to NULL pointer dereference while running strlen() on a NULL pointer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ezxml Project Ezxml | >=0.8.3<=0.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20199 is a vulnerability discovered in ezXML versions 0.8.3 through 0.8.6, which allows for a NULL pointer dereference while running strlen() on a NULL pointer when parsing a crafted XML file.
Ezxml Project Ezxml versions 0.8.3 through 0.8.6 are affected by CVE-2019-20199.
The severity of CVE-2019-20199 is medium with a CVSS score of 6.5.
To fix CVE-2019-20199, it is recommended to update to a version of ezXML that is higher than 0.8.6.
Yes, you can refer to this link for more information: https://sourceforge.net/p/ezxml/bugs/18/