7.8
CWE
611 400
Advisory Published
CVE Published
Updated

CVE-2018-20843: XEE

First published: Mon Jun 24 2019(Updated: )

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
redhat/jbcs-httpd24-curl<0:7.64.1-36.jbcs.el6
0:7.64.1-36.jbcs.el6
redhat/jbcs-httpd24-httpd<0:2.4.37-57.jbcs.el6
0:2.4.37-57.jbcs.el6
redhat/jbcs-httpd24-nghttp2<0:1.39.2-25.jbcs.el6
0:1.39.2-25.jbcs.el6
redhat/jbcs-httpd24-curl<0:7.64.1-36.jbcs.el7
0:7.64.1-36.jbcs.el7
redhat/jbcs-httpd24-httpd<0:2.4.37-57.jbcs.el7
0:2.4.37-57.jbcs.el7
redhat/jbcs-httpd24-nghttp2<0:1.39.2-25.jbcs.el7
0:1.39.2-25.jbcs.el7
redhat/jbcs-httpd24-openssl-pkcs11<0:0.4.10-7.jbcs.el7
0:0.4.10-7.jbcs.el7
redhat/expat<0:2.1.0-12.el7
0:2.1.0-12.el7
redhat/mingw-expat<0:2.2.4-5.el8
0:2.2.4-5.el8
redhat/expat<0:2.2.5-4.el8
0:2.2.5-4.el8
debian/expat<=2.2.6-1<=2.2.0-2+deb9u1<=2.2.0-1
2.2.6-2
2.2.0-2+deb9u2
redhat/expat<2.2.7
2.2.7
debian/expat
2.2.10-2+deb11u5
2.2.10-2+deb11u6
2.5.0-1+deb12u1
2.6.4-1
Debian (libexpat1)<2.2.7
Ubuntu=12.04
Ubuntu=14.04
Ubuntu=16.04
Ubuntu=18.04
Ubuntu=18.10
Ubuntu=19.04
Debian=8.0
Debian=9.0
Fedora=29
Fedora=30
openSUSE=15.0
openSUSE=15.1
Oracle Hospitality RES 3700>=5.7<=5.7.6
Oracle HTTP Server=12.1.3.0
Oracle HTTP Server=12.2.1.4.0
Oracle Outside In Technology=8.5.4
Oracle Outside In Technology=8.5.5
Tenable Nessus<8.15.0
IBM Rational DOORS Next Generation<=6.0.2
IBM Rational DOORS Next Generation<=6.0.6.1
IBM Rational DOORS Next Generation<=6.0.6
IBM Rational DOORS Next Generation<=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2018-20843?

    CVE-2018-20843 has been classified as a high-severity vulnerability due to its potential to cause denial-of-service attacks by consuming excessive resources.

  • How do I fix CVE-2018-20843?

    To fix CVE-2018-20843, update your libexpat version to 2.2.7 or later as recommended by your software provider.

  • What software is affected by CVE-2018-20843?

    CVE-2018-20843 affects several versions of libexpat, particularly versions prior to 2.2.7, along with specific Red Hat packages like jbcs-httpd24-curl and jbcs-httpd24-httpd.

  • What are the symptoms of CVE-2018-20843 exploitation?

    Exploitation of CVE-2018-20843 may result in the XML parser consuming high amounts of RAM and CPU resources, leading to performance degradation or application crashes.

  • Is CVE-2018-20843 present in my system?

    To determine if CVE-2018-20843 is present in your system, check the version of the libexpat library and any affected software packages installed.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203