Описание
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | expat | Out of support scope | ||
Red Hat Enterprise Linux 5 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 5 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 5 | xmlrpc-c | Out of support scope | ||
Red Hat Enterprise Linux 5 | xulrunner | Not affected | ||
Red Hat Enterprise Linux 6 | compat-expat1 | Out of support scope | ||
Red Hat Enterprise Linux 6 | expat | Out of support scope | ||
Red Hat Enterprise Linux 6 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 6 | xulrunner | Not affected | ||
Red Hat Enterprise Linux 7 | python | Not affected |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
In libexpat before 2.2.8, crafted XML input could fool the parser into ...
7.5 High
CVSS3