First published: Sun Apr 11 2021(Updated: )
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ezxml Project Ezxml | =0.8.6 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2021-30485.
The severity of CVE-2021-30485 is medium with a CVSS score of 6.5.
The affected software is ezXML version 0.8.6 and Debian Linux version 9.0.
The CWE ID associated with this vulnerability is CWE-476.
To fix CVE-2021-30485, update to a version of ezXML that is not affected or apply the necessary patches provided by the vendor.