CVE-2022-23308 - Use After Free

Severity

75%

Complexity

39%

Confidentiality

60%

valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.

CVSS 3.1 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P).

Demo Examples

Use After Free

CWE-416

The following example demonstrates the weakness.


               
}
free(buf3R2);

Use After Free

CWE-416

The following code illustrates a use after free error:


               
}
free(ptr);
logError("operation aborted before commit", ptr);

When an error occurs, the pointer is immediately freed. However, this pointer is later incorrectly used in the logError function.

Overview

First reported 2 years ago

2022-02-26 05:15:00

Last updated 2 years ago

2022-11-02 13:18:00

Affected Software

XMLSoft Libxml2

Debian Linux 9.0

9.0

NetApp ONTAP Select Deploy Administration Utility

NetApp Active IQ Unified Manager for VMware vSphere

vmware_vsphere

Apple Mac OS X

References

https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS

https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e

https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS

Release Notes, Third Party Advisory

https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e

Patch, Third Party Advisory

FEDORA-2022-050c712ed7

https://security.netapp.com/advisory/ntap-20220331-0008/

[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update

https://support.apple.com/kb/HT213253

https://support.apple.com/kb/HT213255

https://support.apple.com/kb/HT213256

https://support.apple.com/kb/HT213257

https://support.apple.com/kb/HT213258

https://support.apple.com/kb/HT213254

20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina

20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6

20220516 APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5

20220516 APPLE-SA-2022-05-16-6 tvOS 15.5

20220516 APPLE-SA-2022-05-16-5 watchOS 8.6

20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4

FEDORA-2022-050c712ed7

Mailing List, Third Party Advisory

https://security.netapp.com/advisory/ntap-20220331-0008/

Third Party Advisory

[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update

Mailing List, Third Party Advisory

https://support.apple.com/kb/HT213253

Third Party Advisory

https://support.apple.com/kb/HT213255

Third Party Advisory

https://support.apple.com/kb/HT213256

Third Party Advisory

https://support.apple.com/kb/HT213257

Third Party Advisory

https://support.apple.com/kb/HT213258

Third Party Advisory

https://support.apple.com/kb/HT213254

Third Party Advisory

20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina

Mailing List, Third Party Advisory

20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6

Mailing List, Third Party Advisory

20220516 APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5

Mailing List, Third Party Advisory

20220516 APPLE-SA-2022-05-16-6 tvOS 15.5

Mailing List, Third Party Advisory

20220516 APPLE-SA-2022-05-16-5 watchOS 8.6

Mailing List, Third Party Advisory

20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4

Mailing List, Third Party Advisory

N/A

GLSA-202210-03

N/A

Patch, Third Party Advisory

GLSA-202210-03

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.