expat is vulnerable to having its cryptographic protection mechanisms defeated. This would only be possible when a parser that has not called XML_SetHashSalt or passed it a seed of 0. It is possible due to the use of the srand function.
CPE | Name | Operator | Version |
---|---|---|---|
expat | eq | 2.1 | |
expat | eq | 2.1.0__10.el7_3 | |
expat:3.3 | eq | 2.1.1-r1 | |
expat:trusty | eq | 2.1.0-4ubuntu1 | |
expat:precise | eq | 2.0.1-7.2ubuntu1 |
www.debian.org/security/2016/dsa-3597
www.openwall.com/lists/oss-security/2016/06/03/8
www.openwall.com/lists/oss-security/2016/06/04/1
www.securityfocus.com/bid/91483
www.ubuntu.com/usn/USN-3010-1
bugzilla.redhat.com/show_bug.cgi?id=1197087
security.gentoo.org/glsa/201701-21
source.android.com/security/bulletin/2016-11-01.html
sourceforge.net/p/expat/bugs/499/
sourceforge.net/p/expat/bugs/519/
www.tenable.com/security/tns-2016-20