SB2017011129 - Gentoo update for Expat
Published: January 11, 2017 Updated: October 11, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Cryptographic issues (CVE-ID: CVE-2012-6702)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
2) Resource exhaustion (CVE-ID: CVE-2013-0340)
The vulnerability allows remote attackers to cause a denial of service attack.
The vulnerability exists due to insufficient validation of user-supplied input within the expat library, when processing XML files. A remote attacker can pass specially crafted XML content to the affected library and perform a denial of service (DoS) attack.3) Input validation error (CVE-ID: CVE-2015-1283)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
4) Buffer overflow in Tenable Nessus (CVE-ID: CVE-2016-0718)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The vulnerability exists due to boundary error when handling malformed input documents. A remote unauthenticated attacker can trigger a buffer overflow in the Expat XML parser library and execute arbitrary code by sending specially crafted data to vulnerable server.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) XXE attack (CVE-ID: CVE-2016-4472)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to the overflow protection in Expat is removed by compilers with certain optimization settings. A remote attacker can supply specially crafted XML data and cause the service to crash.
The vulnerability exists due to incomplete fix for CVE-2015-1283 and CVE-2015-2716.
6) Input validation error (CVE-ID: CVE-2016-5300)
The vulnerability allows context-dependent attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (CPU consumption) via crafted identifiers in an XML document.
Remediation
Install update from vendor's website.