hello-world.rs icon indicating copy to clipboard operation
hello-world.rs copied to clipboard

CVE-2017-9233 (High) detected in expat-sys-2.1.6.crate

Open mend-bolt-for-github[bot] opened this issue 4 years ago • 0 comments
trafficstars

CVE-2017-9233 - High Severity Vulnerability

Vulnerable Library - expat-sys-2.1.6.crate

XML parser library written in C

Library home page: https://crates.io/api/v1/crates/expat-sys/2.1.6/download

Dependency Hierarchy:

  • amethyst-0.15.3.crate (Root Library)
    • amethyst_ui-0.15.3.crate
      • font-kit-0.5.0.crate
        • servo-fontconfig-0.4.0.crate
          • servo-fontconfig-sys-4.0.9.crate
            • :x: expat-sys-2.1.6.crate (Vulnerable Library)

Found in HEAD commit: a5a175063bd51fcbbce0eaba88d1b9b6ad315911

Found in base branch: master

Vulnerability Details

XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.

Publish Date: 2017-07-25

URL: CVE-2017-9233

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-9233

Release Date: 2017-07-25

Fix Resolution: 2.2.1


Step up your Open Source Security Game with Mend here