CVE-2012-6702

NameCVE-2012-6702
DescriptionExpat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-508-1, DSA-3597-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
expat (PTS)jessie2.1.0-6+deb8u4fixed
jessie (security)2.1.0-6+deb8u6fixed
stretch2.2.0-2+deb9u2fixed
stretch (security)2.2.0-2+deb9u3fixed
buster2.2.6-2fixed
buster (security)2.2.6-2+deb10u1fixed
bullseye, sid2.2.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
expatsource(unstable)2.1.1-3medium
expatsourcejessie2.1.0-6+deb8u3mediumDSA-3597-1
expatsourcewheezy2.1.0-1+deb7u4mediumDLA-508-1

Search for package or bug name: Reporting problems