製品・ソフトウェアに関する情報
libxml2 におけるバッファエラーの脆弱性
Title libxml2 におけるバッファエラーの脆弱性
Summary

libxml2 には、バッファエラーの脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date May 15, 2017, midnight
Registration Date June 19, 2017, 6:14 p.m.
Last Update June 19, 2017, 6:14 p.m.
CVSS3.0 : 重要
Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
xmlsoft.org
libxml2 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2017年06月19日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2017-9047
Summary

A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.

Publication Date May 18, 2017, 3:29 p.m.
Registration Date Jan. 26, 2021, 1:30 p.m.
Last Update Nov. 21, 2024, 12:35 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:xmlsoft:libxml2:2.9.4:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List