User Activity

  • Posted a comment on ticket #26 on ezXML

    Please do not apply the originally proposed patch CVE-2021-31229-OOBW-000.patch as it calls ezxml_err() with a potentially corrupt t parameter leading to another crash (that does not occur without the patch applied). To avoid this newly introduced issue the offending call to ezxml_err() was changed to not include the potentially corrupt t: --- ezxml.c 2006-06-08 04:33:38.000000000 +0200 +++ ezxml-fixed.c 2021-04-15 15:40:38.054755080 +0200 @@ -320,6 +320,7 @@ { char q, *c, *t, *n = NULL, *v, **ent,...

  • Created ticket #28 on ezXML

    Out-of-bounds write in ezxml_decode() leading to heap corruption

  • Created ticket #27 on ezXML

    Out-of-bounds read/write in ezxml_parse_str() in ezxml.c:586/587

  • Created ticket #26 on ezXML

    Out-of-bounds write in ezxml_internal_dtd()

  • Created ticket #25 on ezXML

    Null pointer dereference in ezxml_internal_dtd()

View All

Personal Data

Username:
rc0r
Joined:
2021-04-09 08:35:15

Projects

  • No projects to display.

Personal Tools