Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-28757

Опубликовано: 10 мар. 2024
Источник: debian
EPSS Низкий

Описание

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
expatfixed2.6.1-2package
libxmltokremovedpackage
libxmltokignoredbookwormpackage

Примечания

  • https://github.com/libexpat/libexpat/pull/842

  • https://github.com/libexpat/libexpat/issues/839

  • Fixed by: https://github.com/libexpat/libexpat/commit/1d50b80cf31de87750103656f6eb693746854aa8

  • Tests: https://github.com/libexpat/libexpat/commit/072eca0b72373da103ce15f8f62d1d7b52695454

  • Expat provides API to mitigate expansion attacks, ultimately under control of the app using Expat

  • Cf. Billion laughs attack assessment for src:expat in CVE-2013-0340.

EPSS

Процентиль: 64%
0.00474
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).

CVSS3: 7.5
redhat
больше 1 года назад

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).

CVSS3: 7.5
nvd
больше 1 года назад

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).

CVSS3: 7.5
msrc
4 месяца назад

Описание отсутствует

CVSS3: 7.5
github
больше 1 года назад

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).

EPSS

Процентиль: 64%
0.00474
Низкий
Уязвимость CVE-2024-28757