hello-world.rs
hello-world.rs copied to clipboard
CVE-2016-5300 (High) detected in expat-sys-2.1.6.crate
CVE-2016-5300 - High Severity Vulnerability
Vulnerable Library - expat-sys-2.1.6.crate
XML parser library written in C
Library home page: https://crates.io/api/v1/crates/expat-sys/2.1.6/download
Dependency Hierarchy:
- amethyst-0.15.3.crate (Root Library)
- amethyst_ui-0.15.3.crate
- font-kit-0.5.0.crate
- servo-fontconfig-0.4.0.crate
- servo-fontconfig-sys-4.0.9.crate
- :x: expat-sys-2.1.6.crate (Vulnerable Library)
- servo-fontconfig-sys-4.0.9.crate
- servo-fontconfig-0.4.0.crate
- font-kit-0.5.0.crate
- amethyst_ui-0.15.3.crate
Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911
Found in base branch: master
Vulnerability Details
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
Publish Date: 2016-06-16
URL: CVE-2016-5300
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-5300
Release Date: 2016-06-16
Fix Resolution: 2.2.0
Step up your Open Source Security Game with Mend here