CVE-2018-20843
Name
CVE-2018-20843
Description
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
NVD Severity
medium
Other trackers
CVE
,
NVD
,
CERT
,
CVE Details
,
CIRCL
,
Arch Linux
,
Debian
,
Red Hat
,
Ubuntu
,
Gentoo
,
SUSE (Bugzilla)
,
SUSE (CVE)
,
Mageia
Mailing lists
oss-security
,
full-disclosure
,
bugtraq
Exploits
Exploit DB
,
Metasploit
Forges
GitHub (
code
,
issues
), Aports (
code
,
issues
)
References
Type
URI
Issue Tracking
https://github.com/libexpat/libexpat/issues/186
Exploit
https://github.com/libexpat/libexpat/pull/262
Issue Tracking
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226
Patch
https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
Release Notes
https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes
Third Party Advisory
https://usn.ubuntu.com/4040-1/
Third Party Advisory
https://usn.ubuntu.com/4040-2/
Mailing List
https://seclists.org/bugtraq/2019/Jun/39
Third Party Advisory
https://www.debian.org/security/2019/dsa-4472
Mailing List
https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20190703-0001/
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/
Third Party Advisory
https://support.f5.com/csp/article/K51011533
Mailing List
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html
Third Party Advisory
https://security.gentoo.org/glsa/201911-08
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html
Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
MISC
https://www.oracle.com/security-alerts/cpuApr2021.html
CONFIRM
https://www.tenable.com/security/tns-2021-11
MISC
https://www.oracle.com/security-alerts/cpuoct2021.html
Match rules
CPE URI
Source package
Min version
Max version
cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*
libexpat
>= None
< 2.2.7
Vulnerable and fixed packages
Source package
Branch
Version
Maintainer
Status