CVE-2016-5300
Summary
| CVE | CVE-2016-5300 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-06-16 18:59:10 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. |
Risk And Classification
Primary CVSS: v3.0 7.5 HIGH from [email protected]
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Problem Types: CWE-399 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 7.5 | HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 2.0 | [email protected] | Primary | 7.8 | AV:N/AC:L/Au:N/C:N/I:N/A:C |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
CompleteAV:N/AC:L/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Android | 4.4.4 | All | All | All | |
| Operating System | Android | 5.0.2 | All | All | All | |
| Operating System | Android | 5.1.1 | All | All | All | |
| Operating System | Android | 6.0 | All | All | All | |
| Operating System | Android | 6.0.1 | All | All | All | |
| Application | Libexpat Project | Libexpat | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Expat: Multiple vulnerabilities (GLSA 201701-21) — Gentoo Security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| Security Bulletin - Policy Auditor update fixes multiple vulnerabilities in third-party libraries (CVE-2016-0718, CVE-2016-4472, CVE-2016-5300, CVE-2017-17740, CVE-2017-9287, CVE-2019-13057, CVE-2020-15719, CVE-2019-1543, CVE-2019-1547, CVE-2019-1552, CVE-2019-1563, CVE-2019-8457, CVE-2018-20506, CVE-2018-20346, CVE-2019-16168, CVE-2017-12627) | af854a3a-2127-422b-91ae-364da2661108 | kc.mcafee.com | |
| USN-3010-1: Expat vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | Third Party Advisory |
| lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e69... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| oss-security - Re: expat hash collision fix too predictable? | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List |
| Android Security Bulletin—November 2016 | Android Open Source Project | af854a3a-2127-422b-91ae-364da2661108 | source.android.com | Third Party Advisory |
| oss-security - Re: expat hash collision fix too predictable? | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List |
| Oracle Solaris Bulletin - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Third Party Advisory |
| Debian -- Security Information -- DSA-3597-1 expat | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Expat CVE-2016-5300 Incomplete Fix Remote Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450... | af854a3a-2127-422b-91ae-364da2661108 | lists.apache.org | |
| CPU July 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | Patch, Third Party Advisory |
| [R2] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities - Security Advisory | Tenable Network Security | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | Third Party Advisory |
| Pony Mail! | MITRE | lists.apache.org | |
| Pony Mail! | MITRE | lists.apache.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710322 Gentoo Linux Expat Multiple Vulnerabilities (GLSA 201701-21)