CVE-2019-15903 (High) detected in buffalo-gplexpat-2.1.0
Opened this issue · 0 comments
mend-bolt-for-github commented
CVE-2019-15903 - High Severity Vulnerability
Vulnerable Library - buffalo-gplexpat-2.1.0
Educational Linux Distribution
Library home page: https://sourceforge.net/projects/buffalo-gpl/
Found in HEAD commit: 4decfd2fae9824215f9a330cac42dc72fe0aef70
Found in base branch: master
Vulnerability Details
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Publish Date: 2019-09-04
URL: CVE-2019-15903
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://security.gentoo.org/glsa/201911-08
Release Date: 2019-09-04
Fix Resolution: 2.2.8
Step up your Open Source Security Game with Mend here