Expat is vulnerable to denial of service. The XML parser xmlparse.c
computes hash values without restricting the ability to trigger hash collisions predictably, allowing an attacker to crash the process by submiting a malicious XML file that triggers multiple hash function collisions to consume excessive amount of CPU resources.
CPE | Name | Operator | Version |
---|---|---|---|
expat | eq | 2.0.1__9.1.el6 | |
expat | eq | 1.95.8__8.3.el5_5.3 | |
expat | eq | 1.95.8__8.3.el5_4.2 | |
expat | eq | 2.0.1__9.1.el6 | |
expat | eq | 1.95.8__8.3.el5_5.3 | |
expat | eq | 1.95.8__8.3.el5_4.2 |
bugs.python.org/issue13703#msg151870
lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.html
rhn.redhat.com/errata/RHSA-2012-0731.html
rhn.redhat.com/errata/RHSA-2016-0062.html
rhn.redhat.com/errata/RHSA-2016-2957.html
secunia.com/advisories/49504
secunia.com/advisories/51024
secunia.com/advisories/51040
sourceforge.net/projects/expat/files/expat/2.1.0/
sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127
www.debian.org/security/2012/dsa-2525
www.mandriva.com/security/advisories?name=MDVSA-2012:041
www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
www.securityfocus.com/bid/52379
www.ubuntu.com/usn/USN-1527-1
www.ubuntu.com/usn/USN-1613-1
www.ubuntu.com/usn/USN-1613-2
access.redhat.com/security/updates/classification/#moderate
kc.mcafee.com/corporate/index?page=content&id=SB10365
rhn.redhat.com/errata/RHSA-2012-0731.html
support.apple.com/HT205637
www.tenable.com/security/tns-2016-20