Upstream information

CVE-2021-42260 at MITRE

Description

TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1191576 [IN_PROGRESS]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 15.2
  • libtinyxml0 >= 2.6.2-lp152.4.3.1
  • tinyxml-devel >= 2.6.2-lp152.4.3.1
  • tinyxml-docs >= 2.6.2-lp152.4.3.1
Patchnames:
openSUSE-2021-1474
openSUSE Leap 15.3
  • libtinyxml0 >= 2.6.2-3.3.1
  • tinyxml-devel >= 2.6.2-3.3.1
  • tinyxml-docs >= 2.6.2-3.3.1
Patchnames:
openSUSE-SLE-15.3-2021-3639


SUSE Timeline for this CVE

CVE page created: Tue Oct 12 16:16:01 2021
CVE page last modified: Mon Dec 12 18:59:53 2022