Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade libxml2
to version 2.12.10, 2.13.6 or higher.
Affected versions of this package are vulnerable to Stack-based Buffer Overflow in the xmlSnprintfElements()
function. An attacker can overwrite out-of-bounds stack memory with XML NCName
data by supplying a malicious XML document or malicious DTD.
This vulnerability is similar to the previously reported and patched (CVE-2017-9047)[https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBXML2-3004044].