add cve/libxml2/2020/yaml/CVE-2020-24977.yaml.
This commit is contained in:
parent
2bfb201716
commit
5e3792e145
|
@ -0,0 +1,19 @@
|
|||
id: CVE-2020-24977
|
||||
source: https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
|
||||
info:
|
||||
name: libxml2是开源的一个用来解析XML文档的函数库。它用C语言写成,并且能为多种语言所调用,例如C语言,C++,XSH。
|
||||
severity: Medium
|
||||
description: |
|
||||
libxml2 v2.9.10和更早版本的libxml2/entities.c的xmlEncodeEntitiesInternal中存在缓冲区错误漏洞,该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
|
||||
scope-of-influence:
|
||||
libxml2< v2.9.10
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2020-24977
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
|
||||
cvss-score: 6.5
|
||||
cve-id: CVE-2020-24977
|
||||
cwe-id: CWE-125
|
||||
cnvd-id: None
|
||||
kve-id: None
|
||||
tags: cve2020,缓冲区错误
|
Loading…
Reference in New Issue