ALT-PU-2017-2121-1
Closed vulnerabilities
BDU:2016-01470
Уязвимость библиотеки парсинга Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-01683
Уязвимость библиотеки Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00112
Уязвимость функции entityValueInitProcessor библиотеки для анализа XML-файлов libexpat, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2012-6702
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/03/8
- http://www.openwall.com/lists/oss-security/2016/06/04/1
- http://www.securityfocus.com/bid/91483
- http://www.ubuntu.com/usn/USN-3010-1
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/03/8
- http://www.openwall.com/lists/oss-security/2016/06/04/1
- http://www.securityfocus.com/bid/91483
- http://www.ubuntu.com/usn/USN-3010-1
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2015-1283
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.debian.org/security/2015/dsa-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/75973
- http://www.securitytracker.com/id/1033031
- http://www.ubuntu.com/usn/USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201603-09
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.debian.org/security/2015/dsa-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/75973
- http://www.securitytracker.com/id/1033031
- http://www.ubuntu.com/usn/USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201603-09
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-0718
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2016-2824.html
- http://seclists.org/fulldisclosure/2017/Feb/68
- http://support.eset.com/ca6333/
- http://www.debian.org/security/2016/dsa-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.openwall.com/lists/oss-security/2016/05/17/12
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/90729
- http://www.securitytracker.com/id/1036348
- http://www.securitytracker.com/id/1036415
- http://www.securitytracker.com/id/1037705
- http://www.ubuntu.com/usn/USN-2983-1
- http://www.ubuntu.com/usn/USN-3044-1
- https://access.redhat.com/errata/RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2016-2824.html
- http://seclists.org/fulldisclosure/2017/Feb/68
- http://support.eset.com/ca6333/
- http://www.debian.org/security/2016/dsa-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.openwall.com/lists/oss-security/2016/05/17/12
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/90729
- http://www.securitytracker.com/id/1036348
- http://www.securitytracker.com/id/1036415
- http://www.securitytracker.com/id/1037705
- http://www.ubuntu.com/usn/USN-2983-1
- http://www.ubuntu.com/usn/USN-3044-1
- https://access.redhat.com/errata/RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-4472
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-5300
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/04/4
- http://www.openwall.com/lists/oss-security/2016/06/04/5
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91159
- http://www.ubuntu.com/usn/USN-3010-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/04/4
- http://www.openwall.com/lists/oss-security/2016/06/04/5
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91159
- http://www.ubuntu.com/usn/USN-3010-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-20
CVE-2017-9233
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
- http://www.debian.org/security/2017/dsa-3898
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securityfocus.com/bid/99276
- http://www.securitytracker.com/id/1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804
- http://www.debian.org/security/2017/dsa-3898
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securityfocus.com/bid/99276
- http://www.securitytracker.com/id/1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804