Miggo Logo

CVE-2024-45492:
An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an...

7.3

CVSS Score
3.1

Basic Information

EPSS Score
0.45242%
Published
8/30/2024
Updated
8/30/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided commit directly patches the function nextScaffoldPart in xmlparse.c to prevent an integer overflow. The vulnerability description explicitly mentions nextScaffoldPart and the m_groupSize variable, which is used in the vulnerable calculation within this function. The patch adds a pre-allocation check for parser->m_groupSize * sizeof(int), confirming this is where the overflow could occur.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in li**xp*t ***or* *.*.*. n*xtS****ol*P*rt in xmlp*rs*.* **n **v* *n int***r ov*r*low *or m_*roupSiz* on **-*it pl*t*orms (w**r* UINT_M*X *qu*ls SIZ*_M*X).

Reasoning

T** provi*** *ommit *ir**tly p*t***s t** *un*tion `n*xtS****ol*P*rt` in `xmlp*rs*.*` to pr*v*nt *n int***r ov*r*low. T** vuln*r**ility **s*ription *xpli*itly m*ntions `n*xtS****ol*P*rt` *n* t** `m_*roupSiz*` v*ri**l*, w*i** is us** in t** vuln*r**l*