CVE-2012-6702

NameCVE-2012-6702
DescriptionExpat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-508-1, DSA-3597-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
expat (PTS)wheezy2.1.0-1+deb7u2vulnerable
wheezy (security)2.1.0-1+deb7u5fixed
jessie (security), jessie2.1.0-6+deb8u4fixed
stretch (security), stretch2.2.0-2+deb9u1fixed
buster, sid2.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
expatsource(unstable)2.1.1-3medium
expatsourcejessie2.1.0-6+deb8u3mediumDSA-3597-1
expatsourcewheezy2.1.0-1+deb7u4mediumDLA-508-1

Search for package or bug name: Reporting problems