First published: Sun Feb 04 2024(Updated: )
libexpat is vulnerable to a denial of service, caused by improper system resource allocation. By sending a specially crafted request using an overly large token, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/expat | <=2.2.6-2+deb10u4<=2.2.10-2+deb11u5<=2.5.0-1<=2.5.0-2 | 2.2.6-2+deb10u7 2.6.2-1 |
Libexpat Project Libexpat | <=2.5.0 | |
ubuntu/expat | <2.4.7-1ubuntu0.3 | 2.4.7-1ubuntu0.3 |
ubuntu/expat | <2.5.0-2ubuntu0.1 | 2.5.0-2ubuntu0.1 |
ubuntu/expat | <2.6.0-1 | 2.6.0-1 |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.