First published: Thu Sep 05 2024(Updated: )
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Expat | ||
debian/expat | <=2.2.10-2+deb11u5<=2.2.10-2+deb11u6<=2.5.0-1+deb12u1 | 2.7.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8176 is classified as a high-severity vulnerability due to its potential to lead to a denial of service through stack overflow.
CVE-2024-8176 affects the Expat libexpat library, particularly in its handling of XML documents.
To mitigate CVE-2024-8176, it is recommended to update to the latest version of libexpat, which addresses this vulnerability.
CVE-2024-8176 allows malicious XML documents with deeply nested entity references to cause endless recursion, leading to stack exhaustion during parsing.
The vulnerability in CVE-2024-8176 is caused by improper handling of recursive entity expansion in the libexpat library.