First published: Thu Sep 05 2024(Updated: )
The libexpat library is vulnerable to a stack overflow due to uncontrolled recursion when processing deeply nested XML entities. This can cause the application to crash, resulting in a denial of service (DoS) or potentially leading to memory corruption, depending on the user's environment and how the library is used. The issue is triggered by supplying a specially crafted XML document designed to create a long chain of recursive entities.
Affected Software | Affected Version | How to fix |
---|---|---|
Expat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2310137 is critical due to the potential for denial of service and memory corruption.
To fix REDHAT-BUG-2310137, update the libexpat library to the latest patched version provided by your vendor.
The potential impacts of REDHAT-BUG-2310137 include application crashes and possible memory corruption.
The software affected by REDHAT-BUG-2310137 is the libexpat library.
Yes, REDHAT-BUG-2310137 can be exploited remotely through the processing of deeply nested XML entities.