XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
https://libexpat.github.io/doc/cve-2017-9233/
https://github.com/libexpat/libexpat/blob/master/expat/Changes
http://www.openwall.com/lists/oss-security/2017/06/17/7
http://www.securityfocus.com/bid/99276
http://www.securitytracker.com/id/1039427
https://support.apple.com/HT208144
https://support.apple.com/HT208115
https://support.apple.com/HT208113
https://support.apple.com/HT208112
http://www.debian.org/security/2017/dsa-3898
https://support.f5.com/csp/article/K03244804
https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cissues.bookkeeper.apache.org%3E
Source: MITRE
Published: 2017-07-25
Updated: 2022-07-28
Type: CWE-611
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH