Out-of-bounds Write in gerph:libxml2
CVE-2025-6021
- gerph:libxml2
- libxml2
- libxml
- libxmljs
- libxml2-nodejs
- libxml2-python3
- OpenCMISS-Dependencies:libxml2
Summary
A flaw was found in libxml2's "xmlBuildQName" function, where integer overflows in buffer size calculations can lead to a Stack-based Buffer Overflow. This issue can result in memory corruption or a Denial of Service (DoS) when processing crafted input. This issue affects libxml versions LIBXML2_2_5_7 through LIBXML2_2_6_30, LIBXML2_6_0 through LIBXML2.7.3, and 2.7.3 through 2.14.3, and libxml2 versions LIBXML2_2_5_7 through LIBXML2_2_6_30, LIBXML2_6_0 through LIBXML2.7.3, and 2.7.3 through 2.14.3.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- NONE
- HIGH
CWE-787 - Out-of-Bounds Write
Out-of-bounds write vulnerability is a memory access bug that allows software to write data past the end or before the beginning of the intended buffer. This may result in the corruption of data, a crash, or arbitrary code execution.
References
Advisory Timeline
- Published