CVE Vulnerabilities

CVE-2023-52425

Uncontrolled Resource Consumption

Published: Feb 04, 2024 | Modified: Nov 04, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
LibexpatLibexpat_project*2.5.0 (including)
Red Hat Enterprise Linux 8RedHatexpat-0:2.2.5-11.el8_9.1*
Red Hat Enterprise Linux 8RedHatxmlrpc-c-0:1.51.0-9.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatexpat-0:2.2.10-1.el8_2*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatexpat-0:2.2.10-1.el8_4*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatexpat-0:2.2.10-1.el8_4*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatexpat-0:2.2.5-8.el8_6.5*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatexpat-0:2.2.5-11.el8_8.2*
Red Hat Enterprise Linux 9RedHatexpat-0:2.5.0-1.el9_3.1*
Red Hat Enterprise Linux 9RedHatexpat-0:2.5.0-1.el9_3.1*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatexpat-0:2.2.10-12.el9_0.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatexpat-0:2.5.0-1.el9_2.1*
Red Hat JBoss Core Services 2.4.62RedHatexpat*
Apache2Ubuntutrusty*
Apr-utilUbuntutrusty*
AyttmUbuntutrusty*
AyttmUbuntuxenial*
CableswigUbuntutrusty*
CableswigUbuntuxenial*
CadaverUbuntubionic*
CadaverUbuntufocal*
CadaverUbuntumantic*
CadaverUbuntuoracular*
CadaverUbuntuplucky*
CadaverUbuntutrusty*
CadaverUbuntuxenial*
CmakeUbuntutrusty*
Coin3Ubuntubionic*
Coin3Ubuntutrusty*
Coin3Ubuntutrusty/esm*
Coin3Ubuntuxenial*
ExpatUbuntubionic*
ExpatUbuntudevel*
ExpatUbuntuesm-infra-legacy/trusty*
ExpatUbuntuesm-infra/bionic*
ExpatUbuntuesm-infra/focal*
ExpatUbuntuesm-infra/xenial*
ExpatUbuntufocal*
ExpatUbuntujammy*
ExpatUbuntumantic*
ExpatUbuntunoble*
ExpatUbuntuoracular*
ExpatUbuntuplucky*
ExpatUbuntuquesting*
ExpatUbuntutrusty*
ExpatUbuntutrusty/esm*
ExpatUbuntuupstream*
ExpatUbuntuxenial*
FirefoxUbuntubionic*
FirefoxUbuntutrusty*
FirefoxUbuntuxenial*
GdcmUbuntutrusty*
GhostscriptUbuntutrusty*
Insighttoolkit4Ubuntubionic*
Insighttoolkit4Ubuntufocal*
Insighttoolkit4Ubuntutrusty*
Insighttoolkit4Ubuntuxenial*
LibxmltokUbuntubionic*
LibxmltokUbuntuesm-apps/bionic*
LibxmltokUbuntuesm-apps/focal*
LibxmltokUbuntuesm-apps/jammy*
LibxmltokUbuntuesm-apps/noble*
LibxmltokUbuntuesm-apps/xenial*
LibxmltokUbuntufocal*
LibxmltokUbuntujammy*
LibxmltokUbuntumantic*
LibxmltokUbuntunoble*
LibxmltokUbuntuoracular*
LibxmltokUbuntuplucky*
LibxmltokUbuntutrusty*
LibxmltokUbuntuxenial*
MatanzaUbuntubionic*
MatanzaUbuntudevel*
MatanzaUbuntuesm-apps/bionic*
MatanzaUbuntuesm-apps/focal*
MatanzaUbuntuesm-apps/jammy*
MatanzaUbuntuesm-apps/noble*
MatanzaUbuntuesm-apps/xenial*
MatanzaUbuntufocal*
MatanzaUbuntujammy*
MatanzaUbuntumantic*
MatanzaUbuntunoble*
MatanzaUbuntuoracular*
MatanzaUbuntuplucky*
MatanzaUbuntuquesting*
MatanzaUbuntutrusty*
MatanzaUbuntuxenial*
SmartUbuntutrusty*
Swish-eUbuntubionic*
Swish-eUbuntufocal*
Swish-eUbuntumantic*
Swish-eUbuntuoracular*
Swish-eUbuntuplucky*
Swish-eUbuntutrusty*
Swish-eUbuntuxenial*
TdomUbuntubionic*
TdomUbuntufocal*
TdomUbuntumantic*
TdomUbuntuoracular*
TdomUbuntuplucky*
TdomUbuntutrusty*
TdomUbuntuxenial*
Texlive-binUbuntutrusty*
ThunderbirdUbuntubionic*
ThunderbirdUbuntumantic*
ThunderbirdUbuntutrusty*
ThunderbirdUbuntuxenial*
Vnc4Ubuntubionic*
Vnc4Ubuntutrusty*
Vnc4Ubuntutrusty/esm*
Vnc4Ubuntuxenial*
VtkUbuntutrusty*
VtkUbuntutrusty/esm*
VtkUbuntuxenial*
Wbxml2Ubuntubionic*
Wbxml2Ubuntufocal*
Wbxml2Ubuntumantic*
Wbxml2Ubuntuoracular*
Wbxml2Ubuntuplucky*
Wbxml2Ubuntutrusty*
Wbxml2Ubuntuxenial*
Xmlrpc-cUbuntubionic*
Xmlrpc-cUbuntufocal*
Xmlrpc-cUbuntumantic*
Xmlrpc-cUbuntuoracular*
Xmlrpc-cUbuntuplucky*
Xmlrpc-cUbuntutrusty*
Xmlrpc-cUbuntutrusty/esm*
Xmlrpc-cUbuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References