SB2017072604 - Arch Linux update for lib32-expat



SB2017072604 - Arch Linux update for lib32-expat

Published: July 26, 2017

Security Bulletin ID SB2017072604
CSH Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2016-9063)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an integer overflow when handling malicious XML files. A remote attacker can send manipulated XML content, trick the victim into opening it and cause the application using the Expat library to crash.

Successful exploitation of the vulnerability results in denial of service.

2) Improper Restriction of XML External Entity Reference (CVE-ID: CVE-2017-9233)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error within entityValueInitProcessor() function while parsing malformed XML in an external entity. An attacker can take advantage of this flaw to cause a denial of service against an application using the Expat library.

Successful exploitation of the vulnerability may allow an attacker to perform a denial of service attack.

Remediation

Install update from vendor's website.