Open mend-bolt-for-github[bot] opened 2 years ago
Educational Linux Distribution
Library home page: https://sourceforge.net/projects/buffalo-gpl/
Found in HEAD commit: f21d202d4f8bf8d80e786f6bed8eb5a9d9049868
Found in base branch: master
/lib/xmlparse.c
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
Publish Date: 2022-01-06
URL: CVE-2021-46143
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-46143
Release Date: 2022-01-06
Fix Resolution: expat - 2.2.6-2+deb10u2,2.2.10-2+deb11u1,2.2.0-2+deb9u4,2.4.3-1
Step up your Open Source Security Game with Mend here
CVE-2021-46143 - High Severity Vulnerability
Vulnerable Library - buffalo-gplexpat-2.1.0
Educational Linux Distribution
Library home page: https://sourceforge.net/projects/buffalo-gpl/
Found in HEAD commit: f21d202d4f8bf8d80e786f6bed8eb5a9d9049868
Found in base branch: master
Vulnerable Source Files (1)
/lib/xmlparse.c
Vulnerability Details
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
Publish Date: 2022-01-06
URL: CVE-2021-46143
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-46143
Release Date: 2022-01-06
Fix Resolution: expat - 2.2.6-2+deb10u2,2.2.10-2+deb11u1,2.2.0-2+deb9u4,2.4.3-1
Step up your Open Source Security Game with Mend here