First published: Thu May 26 2022(Updated: )
** DISPUTED ** A stack buffer overflow exists in Mini-XML v3.2. When inputting an unformed XML string to the mxmlLoadString API, it will cause a stack-buffer-overflow in mxml_string_getc:2611. NOTE: it is unclear whether this input is allowed by the API specification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
mini-xml | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42860 is considered a critical vulnerability due to the potential for stack buffer overflow exploitation.
To fix CVE-2021-42860, update Mini-XML to the latest version or implement input validation to prevent malformed XML strings.
CVE-2021-42860 specifically affects Mini-XML version 3.2 running on systems that utilize this library.
While CVE-2021-42860 presents a stack buffer overflow risk, the potential for remote code execution depends on how the affected software is implemented.
CVE-2021-42860 is a stack buffer overflow that occurs when unformed XML strings are processed by the mxmlLoadString API.