Description
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
References (13)
Core 13
Core References
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208144
Exploit, Technical Description, Vendor Advisory x_refsource_confirm
https://libexpat.github.io/doc/cve-2017-9233/
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/libexpat/libexpat/blob/master/expat/Changes
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1039427
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208113
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208112
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208115
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3898
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/99276
Mailing List, VDB Entry mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2017/06/17/7
Third Party Advisory x_refsource_confirm
https://support.f5.com/csp/article/K03244804
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
Mailing List mailing-list
x_refsource_mlist
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
Scores
CVSS v3
7.5
EPSS
0.0025
EPSS Percentile
48.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-611
CWE-835
Status
published
Products (5)
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
libexpat_project/libexpat
< 2.2.0
python/python
2.7.0 - 2.7.15
Published
Jul 25, 2017
Tracked Since
Feb 18, 2026