HTTP: Libexpat Heap Based Buffer Over Read
This signature detects attempts to exploit a known vulnerability against libexpat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Extended Description
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Affected Products
Python python
References
CVE: CVE-2019-15903
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Python
Libexpat_project
5.0