First published: Thu Nov 05 2009(Updated: )
Expat is vulnerable to a denial of service, caused by the improper handling of XML data by the big2_toUtf8 function within the libexpat library. A remote attacker could exploit this vulnerability using a specially-crafted XML document containing malformed UTF-8 sequences that trigger a buffer over-read to cause the application to crash.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
James Clark Expat | =2.0.1 | |
Xmltwig Xml-twig For Perl | ||
Libexpat Project Libexpat | =2.0.1 | |
Apache HTTP server | >=2.0.35<2.0.64 | |
Apache HTTP server | >=2.2.0<2.2.17 | |
redhat/expat | <0:1.95.7-4.el4_8.2 | 0:1.95.7-4.el4_8.2 |
redhat/expat | <0:1.95.8-8.3.el5_4.2 | 0:1.95.8-8.3.el5_4.2 |
redhat/expat | <2.1.0 | 2.1.0 |
IBM Engineering Requirements Management DOORS | <=9.7.2.8 | |
IBM Engineering Requirements Management DOORS Web Access | <=9.7.2.8 | |
IBM IBM® Rational DOORS/DOORS Web Access | <=9.6.1.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)