In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Link | Tags |
---|---|
https://github.com/libexpat/libexpat/pull/558 | third party advisory |
http://www.openwall.com/lists/oss-security/2022/02/19/1 | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5085 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html | third party advisory mailing list |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://security.netapp.com/advisory/ntap-20220303-0008/ | third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf | third party advisory |
https://security.gentoo.org/glsa/202209-24 | third party advisory vendor advisory |