First published: Mon Oct 11 2021(Updated: )
TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tinyxml | <=2.6.2-4 | 2.6.2-4+deb10u2 2.6.2-4+deb11u2 2.6.2-6+deb12u1 2.6.2-6.1 |
ubuntu/tinyxml | <2.6.2-4ubuntu0.18.04.1~ | 2.6.2-4ubuntu0.18.04.1~ |
ubuntu/tinyxml | <2.6.2-4+ | 2.6.2-4+ |
ubuntu/tinyxml | <2.6.2-3ubuntu0.1~ | 2.6.2-3ubuntu0.1~ |
TinyXML | >=2.3.2<=2.6.2 | |
TinyXML | =2.3.0-beta | |
TinyXML | =2.3.1-beta | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42260 has a high severity as it leads to a denial of service through an infinite loop.
To fix CVE-2021-42260, update your TinyXML package to versions 2.6.2-4+deb10u2, 2.6.2-4+deb11u2, or later.
CVE-2021-42260 affects TinyXML versions up to and including 2.6.2.
The impact of CVE-2021-42260 is denial of service caused by handling crafted XML messages.
Debian and Ubuntu distributions have vulnerable packages affected by CVE-2021-42260.