Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "48.0+build2-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "48.0+build2-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "48.0+build2-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "48.0+build2-0ubuntu0.14.04.1"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "expat",
"binary_version": "2.1.0-7ubuntu0.16.04.1"
},
{
"binary_name": "lib64expat1",
"binary_version": "2.1.0-7ubuntu0.16.04.1"
},
{
"binary_name": "libexpat1",
"binary_version": "2.1.0-7ubuntu0.16.04.1"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "48.0+build2-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "48.0+build2-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "48.0+build2-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "48.0+build2-0ubuntu0.16.04.1"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "libxmlrpc-c++9",
"binary_version": "1.59.03-10.1"
},
{
"binary_name": "libxmlrpc-core-c3t64",
"binary_version": "1.59.03-10.1"
},
{
"binary_name": "libxmlrpc-util4",
"binary_version": "1.59.03-10.1"
},
{
"binary_name": "xmlrpc-api-utils",
"binary_version": "1.59.03-10.1"
}
]
}{
"binaries": [
{
"binary_name": "libxmlrpc-c++9",
"binary_version": "1.60.05-1"
},
{
"binary_name": "libxmlrpc-core-c3t64",
"binary_version": "1.60.05-1"
},
{
"binary_name": "libxmlrpc-util4",
"binary_version": "1.60.05-1"
},
{
"binary_name": "xmlrpc-api-utils",
"binary_version": "1.60.05-1"
}
]
}