CVE-2022-22826
expat: Integer overflow in nextScaffoldPart in xmlparse.c
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
la función nextScaffoldPart en el archivo xmlparse.c en Expat (también se conoce como libexpat) versiones anteriores a 2.4.3, presenta un desbordamiento de enteros
expat (libexpat) is susceptible to a software flaw that causes process interruption. When processing a large number of prefixed XML attributes on a single tag can libexpat can terminate unexpectedly due to integer overflow. The highest threat from this vulnerability is to availability, confidentiality and integrity.
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.51 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.37 Service Pack 10, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, integer overflow, null pointer, out of bounds read, out of bounds write, and server-side request forgery vulnerabilities.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2022-01-08 CVE Reserved
- 2022-01-08 CVE Published
- 2025-04-18 EPSS Updated
- 2025-05-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2022/01/17/3 | Mailing List |
|
https://github.com/libexpat/libexpat/pull/539 | Third Party Advisory | |
https://www.tenable.com/security/tns-2022-05 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf | 2022-10-06 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202209-24 | 2022-10-06 | |
https://www.debian.org/security/2022/dsa-5073 | 2022-10-06 | |
https://access.redhat.com/security/cve/CVE-2022-22826 | 2022-11-08 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2044484 | 2022-11-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libexpat Project Search vendor "Libexpat Project" | Libexpat Search vendor "Libexpat Project" for product "Libexpat" | < 2.4.3 Search vendor "Libexpat Project" for product "Libexpat" and version " < 2.4.3" | - |
Affected
| ||||||
Tenable Search vendor "Tenable" | Nessus Search vendor "Tenable" for product "Nessus" | < 8.15.3 Search vendor "Tenable" for product "Nessus" and version " < 8.15.3" | - |
Affected
| ||||||
Tenable Search vendor "Tenable" | Nessus Search vendor "Tenable" for product "Nessus" | >= 10.0.0 < 10.1.1 Search vendor "Tenable" for product "Nessus" and version " >= 10.0.0 < 10.1.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
| ||||||
Siemens Search vendor "Siemens" | Sinema Remote Connect Server Search vendor "Siemens" for product "Sinema Remote Connect Server" | < 3.1 Search vendor "Siemens" for product "Sinema Remote Connect Server" and version " < 3.1" | - |
Affected
|