CVE-2016-5300

NameCVE-2016-5300
DescriptionThe XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-508-1, DSA-3597-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
expat (PTS)wheezy2.1.0-1+deb7u2vulnerable
wheezy (security)2.1.0-1+deb7u5fixed
jessie (security), jessie2.1.0-6+deb8u4fixed
stretch (security), stretch2.2.0-2+deb9u1fixed
buster, sid2.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
expatsource(unstable)2.1.1-3high
expatsourcejessie2.1.0-6+deb8u3highDSA-3597-1
expatsourcewheezy2.1.0-1+deb7u4highDLA-508-1

Search for package or bug name: Reporting problems