CVE Vulnerabilities

CVE-2018-14404

NULL Pointer Dereference

Published: Jul 19, 2018 | Modified: Dec 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Ubuntu_linuxCanonical12.04 (including)12.04 (including)
Ubuntu_linuxCanonical14.04 (including)14.04 (including)
Ubuntu_linuxCanonical16.04 (including)16.04 (including)
Ubuntu_linuxCanonical18.04 (including)18.04 (including)
Debian_linuxDebian- (including)- (including)
JBoss Core Services Apache HTTP Server 2.4.29 SP2RedHatlibxml2*
Red Hat Ansible Tower 3.5 for RHEL 7RedHatansible-tower-35/ansible-tower:3.5.6-1*
Red Hat Ansible Tower 3.6 for RHEL 7RedHatansible-tower-36/ansible-tower:3.6.4-1*
Red Hat Enterprise Linux 7RedHatlibxml2-0:2.9.1-6.el7.4*
Red Hat Enterprise Linux 8RedHatlibxml2-0:2.9.7-7.el8*
Red Hat Enterprise Linux 8RedHatlibxml2-0:2.9.7-7.el8*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatcockpit-ovirt-0:0.13.10-1.el7ev*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatredhat-release-virtualization-host-0:4.3.9-2.el7ev*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatredhat-virtualization-host-0:4.3.9-20200324.0.el7_8*
Libxml2Ubuntuartful*
Libxml2Ubuntubionic*
Libxml2Ubuntudevel*
Libxml2Ubuntuesm-infra-legacy/trusty*
Libxml2Ubuntuesm-infra/bionic*
Libxml2Ubuntuesm-infra/xenial*
Libxml2Ubuntutrusty*
Libxml2Ubuntutrusty/esm*
Libxml2Ubuntuupstream*
Libxml2Ubuntuxenial*

Potential Mitigations

References