libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
https://issues.oss-fuzz.com/issues/392687022
https://gitlab.gnome.org/GNOME/libxml2/-/issues/847
Source: Mitre, NVD
Published: 2025-02-18
Updated: 2025-02-18
Base Score: 5.6
Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:N
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Severity: High