Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACn5sdQusVVOHdJqBTzyjpy8XCHP=ZmsOzjOU49XB0Bm3kt8BQ@mail.gmail.com>
Date: Sun, 8 May 2016 17:36:10 +0200
From: Gustavo Grieco <gustavo.grieco@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE requested: two stack exhaustation parsing xml files using mxml

Sorry, the title of the mails was "CVE requested", but it should be
"CVE request". Please assign CVE if it is suitable.

Thanks!

2016-05-07 23:40 GMT+02:00 Gustavo Grieco <gustavo.grieco@...il.com>:
> Hi,
>
> We found two stack exhustation conditions that can easily crash mxml
> when parsing an xml. Both issues are affecting versions 2.7 and 2.9
> (and probably others):
>
> * Recursion using mxmlDelete at mxml-node.c:217 (stack-exhaustion-1.xml)
> * Recursion using mxml_write_node at mxml-file.c:2739 (stack-exhaustion-2.xml)
>
> Found using QuickFuzz + Radamsa. Reproducers are attached.
>
> Regards,
> Gustavo.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.