libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
References
Configurations
History
21 Nov 2024, 08:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/03/20/5 - | |
References | () https://github.com/libexpat/libexpat/pull/789 - Exploit, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/ - | |
References | () https://security.netapp.com/advisory/ntap-20240614-0003/ - |
14 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Apr 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Feb 2024, 16:27
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Libexpat Project libexpat
Libexpat Project |
|
References | () https://github.com/libexpat/libexpat/pull/789 - Exploit, Vendor Advisory | |
CWE | CWE-400 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:* |
04 Feb 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-04 20:15
Updated : 2024-11-21 08:39
NVD link : CVE-2023-52425
Mitre link : CVE-2023-52425
CVE.ORG link : CVE-2023-52425
JSON object : View
Products Affected
libexpat_project
- libexpat
CWE
CWE-400
Uncontrolled Resource Consumption