HTTP: Libexpat Heap Based Buffer Over Read

This signature detects attempts to exploit a known vulnerability against libexpat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

Affected Products

Python python

References

CVE: CVE-2019-15903

Short Name
HTTP:CTS:LIBEXPAT-BO
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Based Buffer CVE-2019-15903 Heap Libexpat Over Read
Release Date
12/10/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Python

Libexpat_project

CVSS Score

5.0

Found a potential security threat?