CVE-2018-20843

Click the icon to Follow me:- twitterTelegramRedditDiscord

Summary:

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

Reference Links(if available):

  • https://github.com/libexpat/libexpat/issues/186
  • https://github.com/libexpat/libexpat/pull/262
  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226
  • https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
  • https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes
  • CVSS Score (if available)

    v2: / HIGHAV:N/AC:L/Au:N/C:N/I:N/A:C

    v3: / HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

    Links to Exploits(if available)