[arch-security] [ASA-201706-32] expat: denial of service

Remi Gacogne rgacogne at archlinux.org
Mon Jun 26 16:51:10 UTC 2017


Arch Linux Security Advisory ASA-201706-32
==========================================

Severity: Medium
Date    : 2017-06-26
CVE-ID  : CVE-2016-9063 CVE-2017-9233
Package : expat
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-306

Summary
=======

The package expat before version 2.2.1-1 is vulnerable to denial of
service.

Resolution
==========

Upgrade to 2.2.1-1.

# pacman -Syu "expat>=2.2.1-1"

The problems have been fixed upstream in version 2.2.1.

Workaround
==========

None.

Description
===========

- CVE-2016-9063 (denial of service)

An integer overflow vulnerability has been discovered during the
parsing of XML using the Expat library.

- CVE-2017-9233 (denial of service)

An external entity infinite loop issue has been found in Expat < 2.2.1,
leading to a denial of service.

Impact
======

An attacker can cause a denial of service in an application using expat
by sending a crafted XML payload.

References
==========

https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063
https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20
https://libexpat.github.io/doc/cve-2017-9233/
https://security.archlinux.org/CVE-2016-9063
https://security.archlinux.org/CVE-2017-9233

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170626/bbb52c5f/attachment.asc>


More information about the arch-security mailing list