A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.
References
Configurations
No configuration.
History
17 Mar 2026, 14:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/vstakhov/libucl/issues/323 - |
17 Mar 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 04:16
Updated : 2026-03-17 14:20
NVD link : CVE-2026-0708
Mitre link : CVE-2026-0708
CVE.ORG link : CVE-2026-0708
JSON object : View
Products Affected
No product.
CWE
CWE-125
Out-of-bounds Read
