Vulnerability Description
The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libexpat Project | Libexpat | < 2.1.0 |
| Python | Python | >= 2.6.0, < 2.6.8 |
| Debian | Debian Linux | 6.0 |
| Canonical | Ubuntu Linux | 8.04 |
| Oracle | Solaris | 11.3 |
| Redhat | Storage | 2.0 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 6.2 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 6.2 |
| Redhat | Enterprise Linux Workstation | 5.0 |
Related Weaknesses (CWE)
References
- http://bugs.python.org/issue13703#msg151870Issue TrackingThird Party Advisory
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.htmlBroken LinkMailing List
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.htmlBroken LinkMailing List
- http://mail.libexpat.org/pipermail/expat-discuss/2012-March/002768.htmlBroken Link
- http://rhn.redhat.com/errata/RHSA-2012-0731.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-0062.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2957.htmlThird Party Advisory
- http://secunia.com/advisories/49504Not Applicable
- http://secunia.com/advisories/51024Not Applicable
- http://secunia.com/advisories/51040Not Applicable
- http://sourceforge.net/projects/expat/files/expat/2.1.0/Release NotesThird Party Advisory
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=101Third Party Advisory
- http://www.debian.org/security/2012/dsa-2525Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:041Broken Link
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.htmlThird Party Advisory
FAQ
What is CVE-2012-0876?
CVE-2012-0876 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denia...
How severe is CVE-2012-0876?
CVE-2012-0876 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0876?
Check the references section above for vendor advisories and patch information. Affected products include: Libexpat Project Libexpat, Python Python, Debian Debian Linux, Canonical Ubuntu Linux, Oracle Solaris.