低危 libexpat 至 2.2.7 XML Parser xml 外部实体引用漏洞

CVE编号

CVE-2019-15903

利用情况

暂无

补丁情况

官方补丁

披露时间

2019-09-04
漏洞描述
在2.2.8之前的libexpat中,精心设计的XML输入可能会使解析器过早地从DTD解析更改为文档解析;连续调用XML_GetCurrentLineNumber(或XML_GetCurrentColumnNumber)会导致基于堆的缓冲区过度读取。
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat...
http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-pytho...
http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozil...
http://seclists.org/fulldisclosure/2019/Dec/23
http://seclists.org/fulldisclosure/2019/Dec/26
http://seclists.org/fulldisclosure/2019/Dec/27
http://seclists.org/fulldisclosure/2019/Dec/30
https://access.redhat.com/errata/RHSA-2019:3210
https://access.redhat.com/errata/RHSA-2019:3237
https://access.redhat.com/errata/RHSA-2019:3756
https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43
https://github.com/libexpat/libexpat/issues/317
https://github.com/libexpat/libexpat/issues/342
https://github.com/libexpat/libexpat/pull/318
https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://seclists.org/bugtraq/2019/Dec/17
https://seclists.org/bugtraq/2019/Dec/21
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Nov/1
https://seclists.org/bugtraq/2019/Nov/24
https://seclists.org/bugtraq/2019/Oct/29
https://seclists.org/bugtraq/2019/Sep/30
https://seclists.org/bugtraq/2019/Sep/37
https://security.gentoo.org/glsa/201911-08
https://security.netapp.com/advisory/ntap-20190926-0004/
https://support.apple.com/kb/HT210785
https://support.apple.com/kb/HT210788
https://support.apple.com/kb/HT210789
https://support.apple.com/kb/HT210790
https://support.apple.com/kb/HT210793
https://support.apple.com/kb/HT210794
https://support.apple.com/kb/HT210795
https://usn.ubuntu.com/4132-1/
https://usn.ubuntu.com/4132-2/
https://usn.ubuntu.com/4165-1/
https://usn.ubuntu.com/4202-1/
https://usn.ubuntu.com/4335-1/
https://www.debian.org/security/2019/dsa-4530
https://www.debian.org/security/2019/dsa-4549
https://www.debian.org/security/2019/dsa-4571
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/security/tns-2021-11
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 libexpat_project libexpat * Up to
(excluding)
2.2.8
运行在以下环境
系统 alibaba_cloud_linux_2.1903 expat * Up to
(excluding)
2.1.0-12.1.al7
运行在以下环境
系统 alibaba_cloud_linux_3 expat * Up to
(excluding)
2.2.5-4.1.al8
运行在以下环境
系统 alpine_3.10 expat * Up to
(excluding)
2.7.17-r0
运行在以下环境
系统 alpine_3.11 expat * Up to
(excluding)
2.7.17-r0
运行在以下环境
系统 alpine_3.12 expat * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.13 expat * Up to
(excluding)
2.2.7-r1
运行在以下环境
系统 alpine_3.14 expat * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.15 expat * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.16 expat * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.17 firefox * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.18 expat * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.19 expat * Up to
(excluding)
70.0-r0
运行在以下环境
系统 alpine_3.7 expat * Up to
(excluding)
2.2.7-r1
运行在以下环境
系统 alpine_3.8 expat * Up to
(excluding)
2.2.7-r1
运行在以下环境
系统 alpine_3.9 expat * Up to
(excluding)
2.7.17-r0
运行在以下环境
系统 amazon_2 expat * Up to
(excluding)
2.1.0-12.amzn2
运行在以下环境
系统 amazon_AMI expat * Up to
(excluding)
2.1.0-12.24.amzn1
运行在以下环境
系统 centos_6 thunderbird * Up to
(excluding)
68.2.0-2.el6.centos
运行在以下环境
系统 centos_7 expat * Up to
(excluding)
2.1.0-12.el7
运行在以下环境
系统 debian_10 expat * Up to
(excluding)
90.0.4430.212-1~deb10u1
运行在以下环境
系统 debian_11 expat * Up to
(excluding)
120.0.6099.224-1~deb11u1
运行在以下环境
系统 debian_12 expat * Up to
(excluding)
121.0.6167.139-1~deb12u1
运行在以下环境
系统 fedora_29 expat * Up to
(excluding)
2.2.8-1.fc29
运行在以下环境
系统 fedora_30 expat * Up to
(excluding)
2.2.8-1.fc30
运行在以下环境
系统 fedora_31 expat * Up to
(excluding)
2.2.8-1.fc31
运行在以下环境
系统 kylinos_aarch64_V10 expat * Up to
(excluding)
2.1.0-14.el7_9
运行在以下环境
系统 kylinos_x86_64_V10 expat * Up to
(excluding)
2.1.0-14.el7_9
运行在以下环境
系统 opensuse_Leap_15.0 expat * Up to
(excluding)
2.2.5-lp150.2.6.1
运行在以下环境
系统 opensuse_Leap_15.1 expat * Up to
(excluding)
2.2.5-lp151.3.6.1
运行在以下环境
系统 oracle_7 expat * Up to
(excluding)
2.1.0-12.el7
运行在以下环境
系统 oracle_8 expat * Up to
(excluding)
2.2.5-4.el8
运行在以下环境
系统 redhat_7 expat * Up to
(excluding)
2.1.0-12.el7
运行在以下环境
系统 redhat_8 expat * Up to
(excluding)
2.2.5-4.el8
运行在以下环境
系统 rocky_linux_8 expat * Up to
(excluding)
2.2.5-4.el8
运行在以下环境
系统 suse_12_SP4 expat * Up to
(excluding)
2.1.0-21.9.1
运行在以下环境
系统 suse_12_SP5 python36 * Up to
(excluding)
3.6.10-4.3.5
运行在以下环境
系统 ubuntu_21.04 firefox * Up to
(excluding)
68.2.0+build1.1-0ubuntu1
运行在以下环境
系统 ubuntu_21.10 firefox * Up to
(excluding)
68.2.0+build1.1-0ubuntu1
运行在以下环境
系统 ubuntu_22.10 firefox * Up to
(excluding)
68.2.0+build1.1-0ubuntu1
阿里云评分
3.1
  • 攻击路径
    远程
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    100
CWE-ID 漏洞类型
CWE-125 跨界内存读
CWE-776 DTD中递归实体索引的不恰当限制(XML实体扩展)
阿里云安全产品覆盖情况