[arch-security] [ASA-201603-23] expat: arbitrary code execution
Arch Linux Security Advisory ASA-201603-23 ========================================== Severity: Critical Date : 2016-03-24 CVE-ID : CVE-2015-1283 Package : expat Type : arbitrary code execution Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package expat before version 2.1.1-1 is vulnerable to several integer overflows leading to arbitrary code execution. Resolution ========== Upgrade to 2.1.1-1. # pacman -Syu "expat>=2.1.1-1" The problem has been fixed upstream in version 2.1.1. Workaround ========== None. Description =========== Multiple integer overflows in the XML_GetBuffer() function in Expat through 2.1.0 allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716. Impact ====== A remote attacker can execute arbitrary code on the affected host by submitting a specially crafted XML file for parsing. Note that Expat is used in several products, some of them accepting untrusted XML files from the network. References ========== https://sourceforge.net/p/expat/bugs/528/ https://access.redhat.com/security/cve/CVE-2015-1283
participants (1)
-
Remi Gacogne