提交 #778638: michaelrsweet mxml 4.0.4 Heap-based Buffer Overflow信息

标题michaelrsweet mxml 4.0.4 Heap-based Buffer Overflow
描述While fuzzing the latest version of mxml using SynFuzz and AddressSanitizer, I discovered a heap-buffer-overflow (specifically, an out-of-bounds read with a negative offset) in the index_sort function within mxml-index.c. The vulnerability is triggered when a specifically malformed XML structure is parsed and subsequently passed to mxmlIndexNew to build an index. During the node sorting phase, an array pointer or index appears to decrement past the starting boundary of the allocated node array, resulting in an 8-byte read before the allocated 128-byte heap region. https://github.com/michaelrsweet/mxml/issues/350
来源⚠️ https://github.com/michaelrsweet/mxml/issues/350
用户
 MTHG (UID 83728)
提交2026-03-12 13時31分 (19 日前)
管理2026-03-27 17時23分 (15 days later)
状态已接受
VulDB条目353963 [mxml 直到 4.0.4 mxmlIndexNew mxml-index.c index_sort tempr 内存损坏]
积分20

Want to know what is going to be exploited?

We predict KEV entries!