First published: Tue Aug 29 2023(Updated: )
Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. <a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/535">https://gitlab.gnome.org/GNOME/libxml2/-/issues/535</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2235864 is classified as critical due to the potential exploitation leading to Denial of Service.
To fix REDHAT-BUG-2235864, update to a patched version of Xmlsoft Libxml2 that addresses the global buffer overflow.
By exploiting REDHAT-BUG-2235864, an attacker can cause Denial of Service by supplying a specially crafted XML file.
Xmlsoft Libxml2 version 2.11.0 is specifically affected by the vulnerability identified as REDHAT-BUG-2235864.
The xmlSAX2StartElement() function in Xmlsoft Libxml2 is responsible for the vulnerability identified as REDHAT-BUG-2235864.