CVE-2012-0876

NameCVE-2012-0876
DescriptionThe XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-2525-1
NVD severitymedium
Debian Bugs663579, 687672

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
expat (PTS)stretch (security), stretch2.2.0-2+deb9u3fixed
buster, buster (security)2.2.6-2+deb10u1fixed
bullseye2.2.10-2fixed
bookworm, sid2.4.1-3fixed
xmlrpc-c (PTS)stretch1.33.14-4fixed
buster1.33.14-8fixed
bullseye1.33.14-9fixed
bookworm, sid1.33.14-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
expatsourcesqueeze2.0.1-7+squeeze1DSA-2525-1
expatsource(unstable)2.1.0~beta3-1663579
python2.6source(unstable)(not affected)
xmlrpc-csource(unstable)1.16.33-3.2low687672

Notes

[squeeze] - xmlrpc-c <no-dsa> (Minor issue)
- python2.6 <not-affected> (configured with --with-system-expat since 2.6.6-4)

Search for package or bug name: Reporting problems