Trinadh465/external_expat-2.1.0

CVE-2019-15903 (High) detected in buffalo-gplexpat-2.1.0

Opened this issue · 0 comments

CVE-2019-15903 - High Severity Vulnerability

Vulnerable Library - buffalo-gplexpat-2.1.0

Educational Linux Distribution

Library home page: https://sourceforge.net/projects/buffalo-gpl/

Found in HEAD commit: 4decfd2fae9824215f9a330cac42dc72fe0aef70

Found in base branch: master

Vulnerable Source Files (1)

/lib/xmlparse.c

Vulnerability Details

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

Publish Date: 2019-09-04

URL: CVE-2019-15903

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://security.gentoo.org/glsa/201911-08

Release Date: 2019-09-04

Fix Resolution: 2.2.8


Step up your Open Source Security Game with Mend here