A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/momo1239/CVE-2024-35333 |
History
Mon, 19 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-121 | |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-19T15:28:31.702Z
Reserved:
Link: CVE-2024-35333
Vulnrichment
Updated: 2024-08-02T03:07:46.924Z
NVD
Status : Awaiting Analysis
Published: 2024-05-29T16:15:11.000
Modified: 2024-08-19T16:35:15.757
Link: CVE-2024-35333
Redhat
No data.