Description
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-508-1 | expat security update |
Debian DSA |
DSA-3597-1 | expat security update |
EUVD |
EUVD-2012-6544 | Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function. |
Ubuntu USN |
USN-3010-1 | Expat vulnerabilities |
Ubuntu USN |
USN-3013-1 | XML-RPC for C and C++ vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-06T21:36:02.049Z
Reserved: 2016-06-03T00:00:00.000Z
Link: CVE-2012-6702
No data.
Status : Deferred
Published: 2016-06-16T18:59:00.327
Modified: 2025-04-12T10:46:40.837
Link: CVE-2012-6702
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN