PT-2024-1782 · Python+13 · Python+13
Snild-Sony
·
Published
2024-02-04
·
Updated
2026-02-13
·
CVE-2023-52425
CVSS v2.0
7.8
High
| AV:N/AC:L/Au:N/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions
libexpat versions 2.5.0 and earlier
Description
The issue is related to an uncontrolled resource consumption in the libexpat library, which is used for XML parsing. This can be exploited by a remote attacker to cause a denial of service. The vulnerability arises when a large token requires multiple buffer fills, leading to many full reparsings.
Recommendations
For libexpat versions 2.5.0 and earlier, update libexpat to version 2.6 or later to resolve the issue.
As an alternative, for systems where Python is used, update Python to version 3.13 or later, which includes the updated libexpat library.
Exploit
Fix
DoS
Resource Exhaustion
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Ibm Aix
Linuxmint
Python
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
Libexpat