Stack-Based Buffer Overflow in libxml2 Product by GNOME
CVE-2025-24928

7.8HIGH

Key Information:

Vendor

Xmlsoft

Status
Vendor
CVE Published:
18 February 2025

What is CVE-2025-24928?

The libxml2 library, utilized for XML parsing and validation, contains a stack-based buffer overflow vulnerability in the xmlSnprintfElements function located in valid.c. This flaw can be exploited when DTD validation occurs on untrusted documents or untrusted DTDs, potentially allowing an attacker to manipulate memory and execute arbitrary code. Users are advised to update to the latest version to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

libxml2 0 < 2.12.10

libxml2 2.13.0 < 2.13.6

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.