First published: Fri Mar 09 2012(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <2.1.0 | 2.1.0 |
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 | |
debian/xmlrpc-c | 1.33.14-9 1.33.14-11 1.59.03-6 | |
Debian (libexpat1) | <=2.0.1 | |
Debian (libexpat1) | =1.95.1 | |
Debian (libexpat1) | =1.95.2 | |
Debian (libexpat1) | =1.95.4 | |
Debian (libexpat1) | =1.95.5 | |
Debian (libexpat1) | =1.95.6 | |
Debian (libexpat1) | =1.95.7 | |
Debian (libexpat1) | =1.95.8 | |
Debian (libexpat1) | =2.0.0 | |
Apple iOS and macOS | <=10.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1148 is classified as a denial of service vulnerability due to a memory leak.
To fix CVE-2012-1148, upgrade to expat version 2.1.0 or later whichever is appropriate for your system.
CVE-2012-1148 affects expat versions prior to 2.1.0 and various earlier versions of libexpat.
CVE-2012-1148 can lead to denial of service through excessive memory consumption when processing crafted XML files.
Yes, CVE-2012-1148 affects macOS versions up to 10.11.1 that utilize vulnerable versions of expat.