CVE-2024-35333

8.4 HIGH

📋 TL;DR

A stack buffer overflow vulnerability in html2xhtml 1.3 allows attackers to execute arbitrary code or cause denial of service by providing specially crafted input. This affects systems running the vulnerable html2xhtml software, particularly when processing untrusted HTML content.

💻 Affected Systems

Products:
  • html2xhtml
Versions: 1.3
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration when processing HTML files through the read_charset_decl function.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with attacker gaining full control of the affected system, potentially leading to data theft, system compromise, or lateral movement within the network.

🟠

Likely Case

Denial of service causing application crashes or system instability when processing malicious HTML files.

🟢

If Mitigated

Limited impact with proper input validation and memory protection mechanisms in place, potentially reduced to application crashes without code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub demonstrates the buffer overflow. Exploitation requires feeding malicious input to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check for updated version from software maintainers
2. If no patch available, consider workarounds or alternative software
3. Monitor for security updates

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation for HTML files processed by html2xhtml

Memory Protection

linux

Enable stack protection mechanisms like ASLR and stack canaries if supported

echo 2 > /proc/sys/kernel/randomize_va_space

🧯 If You Can't Patch

  • Discontinue use of html2xhtml for processing untrusted HTML content
  • Implement network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check html2xhtml version: html2xhtml --version

Check Version:

html2xhtml --version

Verify Fix Applied:

Verify version is updated beyond 1.3 or check for patched source code

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Unusual memory access patterns in system logs

Network Indicators:

  • Unusual file transfers to systems running html2xhtml

SIEM Query:

source="application_logs" AND ("segmentation fault" OR "buffer overflow") AND process="html2xhtml"

🔗 References

📤 Share & Export