search menu icon-carat-right cmu-wordmark

CERT Coordination Center

libexpat library is vulnerable to DoS attacks through stack overflow

Vulnerability Note VU#760160

Original Release Date: 2025-05-09 | Last Revised: 2025-05-09

Overview

A stack overflow vulnerability has been discovered within the libexpat open source library. When parsing XML documents with deeply nested entity references, libexpat can recurse indefinitely. This can result in exhaustion of stack space and a crash. An attacker can weaponize this to either perform denial of service (DoS) attacks or memory corruption attacks, based on the libexpat environment and library usage.

Description

libexpat is an Open Source XML parsing library. It is a stream oriented XML parsing library written in the C programming language. It can be used in particular with large files difficult for processing in RAM. A vulnerability has been discovered, tracked as CVE-2024-8176. The vulnerability description can be observed below.

CVE-2024-8176

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.

Impact

An attacker with access to software that uses libexpat could provide a XML document to the program and cause a DoS attack or memory corruption attack. libexpat is used in a variety of different software, and by various companies.

Solution

A patch for the vulnerability has been provided in version 2.7.0 of libexpat. Groups that use libexpat can verify their patch using the POCs provided here: https://github.com/libexpat/libexpat/issues/893#payload_generators

Acknowledgements

This vulnerability was reported to us by the maintainer of the project, Sebastian Pipping, to increase awareness. The vulnerability was originally discovered by Jann Horn of Googles Project Zero. Vendors who wish to join the discussion within VINCE can do so here: https://www.kb.cert.org/vince/. This document was written by Christopher Cullen.

Vendor Information

760160
 

Arch Linux Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 15, 2025

CVE-2024-8176 Affected

Vendor Statement

We used to be affected but we updated to 2.7.0 a long time now: https://archlinux.org/packages/core/x86_64/expat/

Debian GNU/Linux Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 26, 2025

CVE-2024-8176 Affected

Vendor Statement

We are tracking this CVE there: https://security-tracker.debian.org/tracker/CVE-2024-8176

References

D-Link Systems Inc. Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 09, 2025

CVE-2024-8176 Affected

Vendor Statement

D-Link Corporation recognizes the report. Upon investigation we have found the following devices and their firmwares would fall under use of the accused library.

+--------------+--------------+----------+ | Model | Version | Fix date | +--------------+--------------+----------+ | DOM-550-GSO | A1/1.00.02 | TBD | | DOM-530-TSO | A1/1.00.01 | TBD | | DWM-313 | C1/2.00.00 | TBD | | DWM-530-T | A1/1.00.01 | TBD | | DWM-313 | B1/1.01.02 | TBD | | R18 | A1/1.03B02 | TBD | | M18 | A1/1.03B02 | TBD | | DSR-250v2 | B1/1.02.004 | EOL | | DBG-2000 | A1/2.23.B001 | EOL | +--------------+--------------+----------+ Contact D-Link US SIRT: security @ dlink.com

FreeBSD Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 03, 2025

CVE-2024-8176 Affected

Vendor Statement

The FreeBSD base system ships an affected version of expat in contrib as libbsdxml. Since this library is only used by unbound-anchor(8) and tar(1) in the base system, we are not treating this bug as a security vulnerability. The scope for parsing XML from untrusted sources is extremely limited and any exploit would be self-inflicted.

We will issue an errata notice in the coming days to bring affected systems to expat 2.7.1. Our errata notice will advise users to check if they have installed expat from ports or as a package. Those systems may be vulnerable.

The ports tree was already updated with expat 2.7.1 and pkg audit will advise users if they may be affected.

Gentoo Linux Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 28, 2025

CVE-2024-8176 Affected

Vendor Statement

We have not received a statement from the vendor.

HardenedBSD Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 25, 2025

CVE-2024-8176 Affected

Vendor Statement

HardenedBSD ships with libexpat in the base operating system. We inherit it from our upstream, FreeBSD.

Illumos Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 26, 2025

CVE-2024-8176 Affected

Vendor Statement

illumos proper has one component that uses libexpat, namely hald. Not all distributions ship hald. Most distributions, however, do use libexpat for other purposes, and they should update to 2.7.0 if they aren't already, just for code hygeine.

hald is a global-zone daemon, so an attacker would need access to the global zone, possibly privileged access, to attempt an exploit.

Other attack surfaces will depend on other distros' uses of libexpat.

Intel Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 29, 2025

CVE-2024-8176 Affected

Vendor Statement

please review Intel's security announcement here: https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2025-4-15-001.html

References

NetApp Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 14, 2025

CVE-2024-8176 Affected

Vendor Statement

NetApp advisory: https://security.netapp.com/advisory/NTAP-20250328-0009

NixOS Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 14, 2025

CVE-2024-8176 Affected

Vendor Statement

We have not received a statement from the vendor.

References

Red Hat Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 15, 2025

CVE-2024-8176 Affected

Vendor Statement

We have not received a statement from the vendor.

References

Rocky Linux Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 07, 2025

CVE-2024-8176 Affected

Vendor Statement

We have not received a statement from the vendor.

SUSE Linux Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 25, 2025

CVE-2024-8176 Affected

Vendor Statement

SUSE ships libexpat affected by this problem, however -fstack-clash-protection is active in our distributions and mitigates the issue.

References

Triton Data Center Affected

Notified:  2025-03-26 Updated: 2025-05-09

Statement Date:   March 28, 2025

CVE-2024-8176 Affected

Vendor Statement

SmartOS is one of the illumos distros that does not ship hald from its downstream illumos.

However, SmartOS ships a node.js component that uses a self-built fork of node-expat, a front-end to libexpat. This component does not get accessed outside the confines of SmartOS VM operations, where expat is used to parse XML files generated by other non-expat illumos utilities (/etc/zones/*.xml).

Unless the attacker has access to a SmartOS's global zone with privileges to alter files in /etc/zones, either with the likes of vmadm(8), zonecfg(8), or zoneadm(8), or by using direct file operations, the attack surface is low.

As a precaution, SmartOS will have an updated platform-only libexpat starting with release 20240403. The OS ticket in the case references will be made public, and the commit is already in illumos-extra repo as of today. Also upon embargo lifting, a Triton Product Security notice about this will land on https://security.tritondatacenter.com/

References

Ubuntu Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 15, 2025

CVE-2024-8176 Affected

Vendor Statement

https://ubuntu.com/security/CVE-2024-8176

GnuTLS Not Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 25, 2025

CVE-2024-8176 Not Affected

Vendor Statement

GnuTLS, libtasn1, guile-gnutls is not using libexpat

Joyent Not Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 03, 2025

CVE-2024-8176 Not Affected

Vendor Statement

We have not received a statement from the vendor.

Microsoft Not Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   April 29, 2025

CVE-2024-8176 Not Affected

Vendor Statement

Based on MSRC's investigation, libexpat is only used to parse xml returned from bing servers as validated by https. This code also runs in an app sandbox which further limits exploitability. This has been deprecated and will be removed upon the completion of the 1 year minimum wait period.

References

OpenSSL Not Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 25, 2025

CVE-2024-8176 Not Affected

Vendor Statement

We do not use libexpat at all.

OPNsense Not Affected

Notified:  2025-03-25 Updated: 2025-05-09

Statement Date:   March 25, 2025

CVE-2024-8176 Not Affected

Vendor Statement

We have not received a statement from the vendor.

AERAsec Network Services and Security GMbH Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

AirWatch Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Alcatel-Lucent Enterprise Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Alpine Linux Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Alt-n Technologies Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Amazon Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Android Open Source Project Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Apple Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Arista Networks Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Aruba Networks Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Astaro Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Avaya Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Belkin Inc. Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

BlackBerry Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Blackberry QNX Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

CA Technologies Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Check Point Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Cisco Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Cricket Wireless Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Dell EMC Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

DesktopBSD Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

DragonFly BSD Project Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Exim Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

F5 Networks Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Forcepoint Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Fortinet Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Global Technology Associates Inc. Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Google Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Hewlett Packard Enterprise Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Hitachi Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

HP Inc. Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

HTC Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Huawei Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

IBM Numa-Q Division (Formerly Sequent) Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Juniper Networks Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Kerio Technologies Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Lenovo Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

LG Electronics Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

m0n0wall Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Marconi Inc. Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

McAfee Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Micro Focus Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Motorola Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

NEC Corporation Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

NetBSD Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Netfilter Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Netscreen Inc. Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Nexenta Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Nokia Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

OpenBSD Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

OpenIndiana Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

OpenSSL Project Mime Peer Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Openwall GNU/*/Linux Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Oracle Corporation Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Palo Alto Networks Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

pfSense Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

QBIK New Zealand Limited Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Samsung Mobile Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Slackware Linux Inc. Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

SmoothWall Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Sony Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Symantec Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Synology Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Tenable Network Security Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Tizen Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

TrueOS Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Turbolinux Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Unisys Corporation Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Univention Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Watchguard Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Xiaomi Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

XigmaNAS Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

Zyxel Unknown

Notified:  2025-03-25 Updated: 2025-05-09

CVE-2024-8176 Unknown

Vendor Statement

We have not received a statement from the vendor.

View all 93 vendors View less vendors


Other Information

CVE IDs: CVE-2024-8176
API URL: VINCE JSON | CSAF
Date Public: 2025-05-09
Date First Published: 2025-05-09
Date Last Updated: 2025-05-09 10:49 UTC
Document Revision: 1

Sponsored by CISA.