First published: Tue Feb 18 2025(Updated: )
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to <a href="https://access.redhat.com/security/cve/CVE-2017-9047">CVE-2017-9047</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2-devel | <2.12.10>2.13.0<2.13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2346421 is critical due to the potential for remote code execution through stack-based buffer overflow.
To fix REDHAT-BUG-2346421, update libxml2 to version 2.12.10 or higher, or to version 2.13.6 or higher.
Versions of libxml2 before 2.12.10 and versions between 2.13.0 and 2.13.6 are affected by REDHAT-BUG-2346421.
REDHAT-BUG-2346421 is a stack-based buffer overflow vulnerability located in the xmlSnprintfElements function.
Exploitation of REDHAT-BUG-2346421 requires DTD validation to occur for an untrusted document or untrusted DTD.