The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "expat",
"binary_version": "2.1.0-7ubuntu0.16.04.2"
},
{
"binary_name": "lib64expat1",
"binary_version": "2.1.0-7ubuntu0.16.04.2"
},
{
"binary_name": "libexpat1",
"binary_version": "2.1.0-7ubuntu0.16.04.2"
}
]
}{
"binaries": [
{
"binary_name": "libxmlrpc-c++9",
"binary_version": "1.59.03-10.1"
},
{
"binary_name": "libxmlrpc-core-c3t64",
"binary_version": "1.59.03-10.1"
},
{
"binary_name": "libxmlrpc-util4",
"binary_version": "1.59.03-10.1"
},
{
"binary_name": "xmlrpc-api-utils",
"binary_version": "1.59.03-10.1"
}
]
}{
"binaries": [
{
"binary_name": "libxmlrpc-c++9",
"binary_version": "1.60.05-1"
},
{
"binary_name": "libxmlrpc-core-c3t64",
"binary_version": "1.60.05-1"
},
{
"binary_name": "libxmlrpc-util4",
"binary_version": "1.60.05-1"
},
{
"binary_name": "xmlrpc-api-utils",
"binary_version": "1.60.05-1"
}
]
}