[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

libexpat - (bulletinoct2019)

ID: oval:org.secpod.oval:def:2105077Date: (C)2019-12-30   (M)2024-04-15
Class: PATCHFamily: unix




In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

Platform:
Sun Solaris 11
Product:
runtime/python-27
runtime/python-27/tests
library/python/tkinter-27
library/expat
web/data/firefox-bookmarks
web/browser/firefox
mail/thunderbird
mail/thunderbird/plugin/thunderbird-lightning
Reference:
bulletinoct2019
CVE-2019-15903
CVE-2019-11757
CVE-2019-11758
CVE-2019-11759
CVE-2019-11760
CVE-2019-11761
CVE-2019-11762
CVE-2019-11763
CVE-2019-11764
CVE    9
CVE-2019-11761
CVE-2019-11762
CVE-2019-11760
CVE-2019-15903
...
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies