Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2024-45491
CriticalVulnerability Description
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
38 configuration(s) from 1 vendor(s)
cpe:2.3:a:libexpat_project:libexpat:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.4:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.1:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.8:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.5:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.6:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.2:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.7:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:1.95.3:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:libexpat_project:libexpat:2.4.5:*:*:*:*:*:*:*
2024-Oct-CVE-2024-45491
CVE-2024-45491: None
2025-Mar-CVE-2024-45491
CVE-2024-45491: None
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
https://github.com/libexpat/libexpat/issues/888cve@mitre.org Issue Tracking
-
https://github.com/libexpat/libexpat/pull/891cve@mitre.org Patch
-
https://lists.debian.org/debian-lts-announce/2024/09/msg00036.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://security.netapp.com/advisory/ntap-20241018-0003/af854a3a-2127-422b-91ae-364da2661108
Severity Details
Weakness Type (CWE)
Integer Overflow or Wraparound
- Description
- The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value…
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- August 30, 2024
