CVE-2012-1148
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
03/07/2012
Last modified:
11/04/2025
Description
Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:* | 2.0.1 (including) | |
cpe:2.3:a:libexpat_project:libexpat:1.95.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:1.95.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:1.95.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:1.95.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:1.95.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:1.95.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:1.95.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:libexpat_project:libexpat:2.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.11.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166&r2=1.167
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2012-0731.html
- http://rhn.redhat.com/errata/RHSA-2016-0062.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://secunia.com/advisories/49504
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127
- http://www.debian.org/security/2012/dsa-2525
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A041
- http://www.securityfocus.com/bid/52379
- http://www.securitytracker.com/id/1034344
- http://www.ubuntu.com/usn/USN-1527-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://support.apple.com/HT205637
- http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166&r2=1.167
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2012-0731.html
- http://rhn.redhat.com/errata/RHSA-2016-0062.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://secunia.com/advisories/49504
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127
- http://www.debian.org/security/2012/dsa-2525
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A041
- http://www.securityfocus.com/bid/52379
- http://www.securitytracker.com/id/1034344
- http://www.ubuntu.com/usn/USN-1527-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://support.apple.com/HT205637