Lucene search

K
amazonAmazonALAS-2020-1460
HistoryDec 16, 2020 - 8:31 p.m.

Medium: expat

2020-12-1620:31:00
alas.aws.amazon.com
25

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

Issue Overview:

It was discovered that the “setElementTypePrefix()” function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service. (CVE-2018-20843 __)

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read. (CVE-2019-15903 __)

Affected Packages:

expat

Issue Correction:
Run yum update expat to update your system.

New Packages:

i686:  
    expat-2.1.0-12.24.amzn1.i686  
    expat-debuginfo-2.1.0-12.24.amzn1.i686  
    expat-devel-2.1.0-12.24.amzn1.i686  
  
src:  
    expat-2.1.0-12.24.amzn1.src  
  
x86_64:  
    expat-debuginfo-2.1.0-12.24.amzn1.x86_64  
    expat-devel-2.1.0-12.24.amzn1.x86_64  
    expat-2.1.0-12.24.amzn1.x86_64  

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C