Description
A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-35286 | A stack-buffer-overflow vulnerability exists in the read_charset_decl function of html2xhtml 1.3. This vulnerability occurs due to improper bounds checking when copying data into a fixed-size stack buffer. An attacker can exploit this vulnerability by providing a specially crafted input to the vulnerable function, causing a buffer overflow and potentially leading to arbitrary code execution, denial of service, or data corruption. |
References
| Link | Providers |
|---|---|
| https://github.com/momo1239/CVE-2024-35333 |
|
History
Mon, 19 Aug 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:54:08.863Z
Reserved: 2024-05-17T00:00:00.000Z
Link: CVE-2024-35333
Updated: 2024-08-02T03:07:46.924Z
Status : Awaiting Analysis
Published: 2024-05-29T16:15:11.000
Modified: 2024-11-21T09:20:08.757
Link: CVE-2024-35333
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD