First published: Sun Feb 04 2024(Updated: )
libexpat is vulnerable to a denial of service, caused by improper system resource allocation. By sending a specially crafted request using an overly large token, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/expat | <=2.2.6-2+deb10u4<=2.2.10-2+deb11u5<=2.5.0-1<=2.5.0-2 | 2.2.6-2+deb10u7 2.6.2-1 |
ubuntu/expat | <2.4.7-1ubuntu0.3 | 2.4.7-1ubuntu0.3 |
ubuntu/expat | <2.5.0-2ubuntu0.1 | 2.5.0-2ubuntu0.1 |
ubuntu/expat | <2.6.0-1 | 2.6.0-1 |
IBM Cognos Dashboards | <=5.0.0 | |
IBM Cognos Dashboards | <=4.8.0 | |
Debian (libexpat1) | <=2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52425 has a severity of medium due to its potential to cause denial of service through improper system resource allocation.
To fix CVE-2023-52425, you should update the libexpat package to versions 2.2.6-2+deb10u7, 2.6.2-1 in Debian or to 2.4.7-1ubuntu0.3, 2.5.0-2ubuntu0.1, or 2.6.0-1 in Ubuntu.
Versions of expat up to and including 2.5.0 are affected by CVE-2023-52425.
Yes, CVE-2023-52425 can be exploited remotely by sending specially crafted requests with overly large tokens.
The impact of CVE-2023-52425 on affected systems is a denial of service, which can disrupt service availability.