First published: Tue Jul 03 2012(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 | |
debian/xmlrpc-c | 1.33.14-9 1.33.14-11 1.59.03-6 | |
Debian (libexpat1) | <2.1.0 | |
Python Babel Localedata | >=2.6.0<2.6.8 | |
Python Babel Localedata | >=2.7.0<2.7.3 | |
Python Babel Localedata | >=3.1.0<3.1.5 | |
Python Babel Localedata | >=3.2.0<3.2.3 | |
Debian GNU/Linux | =6.0 | |
Debian GNU/Linux | =7.0 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Oracle Solaris SPARC | =11.3 | |
Red Hat Storage | =2.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =6.2 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =6.2 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
Debian | =6.0 | |
Debian | =7.0 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Ubuntu | =11.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0876 is considered to have a medium severity due to its potential to cause denial of service through CPU exhaustion.
To fix CVE-2012-0876, update to expat version 2.1.0 or later, as well as the appropriate patched versions for other affected software.
CVE-2012-0876 affects expat versions prior to 2.1.0 and various versions of Python and Red Hat Enterprise Linux, among others.
Yes, CVE-2012-0876 can potentially be exploited by sending a specially crafted XML file from a remote attacker.
The impact of CVE-2012-0876 can lead to denial of service through increased CPU consumption when processing malicious XML files.