Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-02829

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 5
EPSS Низкий

Описание

Множественные уязвимости пакета libexpat1-udeb операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена удаленно

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
expat - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
libexpat1 - 1.95.8-3.4+etch2
s390x:
libexpat1 - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
i686:
libexpat1 - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
arm:
libexpat1 - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
sparc:
libexpat1-dev - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
libexpat1 - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
x86-64:
libexpat1 - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
alpha:
libexpat1 - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
ia64:
libexpat1-udeb - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1 - 1.95.8-3.4+etch2
mips:
libexpat1-udeb - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1-dev - 1.95.8-3.4+etch2
libexpat1 - 1.95.8-3.4+etch2
hppa:
libexpat1-dev - 1.95.8-3.4+etch2
expat - 1.95.8-3.4+etch2
libexpat1-udeb - 1.95.8-3.4+etch2
libexpat1 - 1.95.8-3.4+etch2
Debian GNU/Linux 5:
ppc:
libexpat1 - 2.0.1-4+lenny2
lib64expat1 - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
lib64expat1-dev - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
s390x:
libexpat1-dev - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
lib64expat1 - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
lib64expat1-dev - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
i686:
libexpat1-udeb - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
lib64expat1-dev - 2.0.1-4+lenny2
lib64expat1 - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
arm:
libexpat1-udeb - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
sparc:
libexpat1-udeb - 2.0.1-4+lenny2
lib64expat1 - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
lib64expat1-dev - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
x86-64:
libexpat1-dev - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
armel:
libexpat1-dev - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
alpha:
libexpat1-udeb - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
ia64:
expat - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
mips:
libexpat1-dev - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
mipsel:
libexpat1-dev - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1-udeb - 2.0.1-4+lenny2
hppa:
libexpat1-udeb - 2.0.1-4+lenny2
libexpat1-dev - 2.0.1-4+lenny2
expat - 2.0.1-4+lenny2
libexpat1 - 2.0.1-4+lenny2

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 89%
0.04481
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.

redhat
больше 15 лет назад

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.

nvd
больше 15 лет назад

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.

debian
больше 15 лет назад

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, a ...

github
около 3 лет назад

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.

EPSS

Процентиль: 89%
0.04481
Низкий

5 Medium

CVSS2