libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: mitre
Published: 2017-05-18T06:13:00
Updated: 2024-08-05T16:55:22.155Z
Reserved: 2017-05-18T00:00:00
Link: CVE-2017-9048
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Deferred
Published: 2017-05-18T06:29:00.433
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9048
 Redhat
                        Redhat