Vulnerability Description
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ezxml Project | Ezxml | >= 0.8.3, <= 0.8.6 |
Related Weaknesses (CWE)
References
- https://sourceforge.net/p/ezxml/bugs/15/ExploitThird Party Advisory
- https://sourceforge.net/p/ezxml/bugs/15/ExploitThird Party Advisory
FAQ
What is CVE-2019-20006?
CVE-2019-20006 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), lead...
How severe is CVE-2019-20006?
CVE-2019-20006 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-20006?
Check the references section above for vendor advisories and patch information. Affected products include: Ezxml Project Ezxml.