First published: Thu Jun 16 2016(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 | |
Libexpat Project Libexpat | <2.2.0 | |
Google Android | =4.4.4 | |
Google Android | =5.0.2 | |
Google Android | =5.1.1 | |
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | ||
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5300 is a vulnerability in the XML parser in Expat that allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.
The severity of CVE-2016-5300 is high with a CVSS score of 7.5.
The vulnerability can be exploited by using crafted identifiers in an XML document to cause a denial of service by consuming excessive CPU resources.
XMLRPC-C version 1.16.33-3.1ubuntu5.2, Expat version 2.0.1-7.2ubuntu1.4, Expat version 2.1.0-4ubuntu1.3, Expat version 2.1.0-7ubuntu0.15.10.2, Expat version 2.1.0-7ubuntu0.16.04.2, Expat version 2.2.6-2+deb10u4, Expat version 2.2.6-2+deb10u6, Expat version 2.2.10-2+deb11u5, Expat version 2.5.0-1, and Expat version 2.5.0-2 are affected.
To fix CVE-2016-5300, make sure you have updated to XMLRPC-C version 1.16.33-3.1ubuntu5.2 or later, or Expat version 2.0.1-7.2ubuntu1.4 or later, depending on the affected software.