[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2020-1513 --- expat

ID: oval:org.secpod.oval:def:1700427Date: (C)2020-11-05   (M)2024-05-22
Class: PATCHFamily: unix




It was discovered that the "setElementTypePrefix" function incorrectly extracted XML namespace prefixes. By tricking an application into processing a specially crafted XML file, an attacker could cause unusually high consumption of memory resources and possibly lead to a denial of service. In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber then resulted in a heap-based buffer over-read

Platform:
Amazon Linux 2
Product:
expat
Reference:
ALAS2-2020-1513
CVE-2018-20843
CVE-2019-15903
CVE    2
CVE-2018-20843
CVE-2019-15903

© SecPod Technologies