Short Name |
HTTP:CTS:LIBEXPAT-BO |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Libexpat Heap Based Buffer Over Read |
Release Date |
2019/12/10 |
Update Number |
3232 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against libexpat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.