CVE-2012-0876

NameCVE-2012-0876
DescriptionThe XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2525-1
Debian Bugs663579, 687672

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
expat (PTS)jessie, jessie (lts)2.1.0-6+deb8u10fixed
stretch (security)2.2.0-2+deb9u5fixed
stretch (lts), stretch2.2.0-2+deb9u7fixed
buster2.2.6-2+deb10u4fixed
buster (security)2.2.6-2+deb10u6fixed
bullseye (security), bullseye2.2.10-2+deb11u5fixed
bookworm2.5.0-1fixed
trixie2.5.0-2fixed
sid2.6.2-1fixed
xmlrpc-c (PTS)jessie1.33.14-0.2fixed
stretch1.33.14-4fixed
buster1.33.14-8fixed
bullseye1.33.14-9fixed
trixie, bookworm1.33.14-11fixed
sid1.33.14-12fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
expatsourcesqueeze2.0.1-7+squeeze1DSA-2525-1
expatsource(unstable)2.1.0~beta3-1663579
python2.6source(unstable)(not affected)
xmlrpc-csource(unstable)1.16.33-3.2low687672

Notes

[squeeze] - xmlrpc-c <no-dsa> (Minor issue)
- python2.6 <not-affected> (configured with --with-system-expat since 2.6.6-4)

Search for package or bug name: Reporting problems