Vulnerability Details : CVE-2018-14404
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2018-14404
- cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-14404
2.98%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-14404
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2018-14404
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-14404
-
https://security.netapp.com/advisory/ntap-20190719-0002/
CVE-2018-14404 Libxml2 Vulnerability in NetApp Products | NetApp Product Security
-
https://bugzilla.redhat.com/show_bug.cgi?id=1595985
1595985 – (CVE-2018-14404) CVE-2018-14404 libxml2: NULL pointer dereference in xpath.c:xmlXPathCompOpEval() can allow attackers to cause a denial of serviceIssue Tracking;Third Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
#901817 - libxml2: CVE-2018-14404: NULL pointer deref in xpath.c:xmlXPathCompOpEval() - Debian Bug report logsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
[SECURITY] [DLA 2369-1] libxml2 security update
-
https://gitlab.gnome.org/GNOME/libxml2/issues/10
NULL pointer deref in xpath.c:xmlXPathCompOpEval() (#10) · Issues · GNOME / libxml2 · GitLabVendor Advisory
-
https://usn.ubuntu.com/3739-2/
USN-3739-2: libxml2 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://usn.ubuntu.com/3739-1/
USN-3739-1: libxml2 vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:1543
RHSA-2019:1543 - Security Advisory - Red Hat Customer Portal
-
https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html
[SECURITY] [DLA 1524-1] libxml2 security update
Jump to