Skip to content
This repository has been archived by the owner on Nov 6, 2020. It is now read-only.

CVE-2017-11742 (High) detected in expat-expat-2.2.1 #17

Open
mend-bolt-for-github bot opened this issue Mar 12, 2020 · 0 comments
Open

CVE-2017-11742 (High) detected in expat-expat-2.2.1 #17

mend-bolt-for-github bot opened this issue Mar 12, 2020 · 0 comments
Labels
security vulnerability Security vulnerability detected by WhiteSource

Comments

@mend-bolt-for-github
Copy link
Contributor

CVE-2017-11742 - High Severity Vulnerability

Vulnerable Library - expatexpat-2.2.1

Fast XML parser library in C

Library home page: https://sourceforge.net/projects/expat/

Found in HEAD commit: 0b8ca0156130fe8d67f2fdd42af9d2f264587034

Library Source Files (17)

* The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.

  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/examples/outline.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmltok.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/siphash.h
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/expat_external.h
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/xmlwf.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmlparse.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/unixfilemap.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/examples/elements.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/readfilemap.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/win32filemap.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmlrole.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/winconfig.h
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/filemap.h
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/xmlfile.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/xmlwf/codepage.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/xmltok_impl.c
  • /ecosurvivalserver/node_modules/node-expat/deps/libexpat/lib/expat.h

Vulnerability Details

The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.

Publish Date: 2017-07-30

URL: CVE-2017-11742

CVSS 3 Score Details (7.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: libexpat/libexpat@d70eabf

Release Date: 2017-07-15

Fix Resolution: Replace or update the following files: Changes, xmlparse.c


Step up your Open Source Security Game with WhiteSource here

@mend-bolt-for-github mend-bolt-for-github bot added the security vulnerability Security vulnerability detected by WhiteSource label Mar 12, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
security vulnerability Security vulnerability detected by WhiteSource
Projects
None yet
Development

No branches or pull requests

0 participants