CVE Vulnerabilities

CVE-2019-20007

NULL Pointer Dereference

Published: Dec 26, 2019 | Modified: Jan 02, 2020
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Ezxml Ezxml_project 0.8.2 (including) 0.8.6 (including)
Mapcache Ubuntu bionic *
Mapcache Ubuntu groovy *
Mapcache Ubuntu hirsute *
Mapcache Ubuntu impish *
Mapcache Ubuntu kinetic *
Mapcache Ubuntu lunar *
Mapcache Ubuntu mantic *
Mapcache Ubuntu trusty *
Mapcache Ubuntu xenial *
Netcdf Ubuntu bionic *
Netcdf Ubuntu groovy *
Netcdf Ubuntu hirsute *
Netcdf Ubuntu impish *
Netcdf Ubuntu kinetic *
Netcdf Ubuntu lunar *
Netcdf Ubuntu mantic *
Netcdf Ubuntu trusty *
Netcdf Ubuntu trusty/esm *
Netcdf Ubuntu xenial *
Netcdf-parallel Ubuntu groovy *
Netcdf-parallel Ubuntu hirsute *
Netcdf-parallel Ubuntu impish *
Netcdf-parallel Ubuntu kinetic *
Netcdf-parallel Ubuntu lunar *
Netcdf-parallel Ubuntu mantic *
Netcdf-parallel Ubuntu trusty *
Netcdf-parallel Ubuntu xenial *
Scilab Ubuntu bionic *
Scilab Ubuntu groovy *
Scilab Ubuntu hirsute *
Scilab Ubuntu impish *
Scilab Ubuntu kinetic *
Scilab Ubuntu lunar *
Scilab Ubuntu mantic *
Scilab Ubuntu trusty *
Scilab Ubuntu xenial *

Potential Mitigations

References