{
  "threat_severity" : "Moderate",
  "public_date" : "2012-03-03T00:00:00Z",
  "bugzilla" : {
    "description" : "expat: hash table collisions CPU usage DoS",
    "id" : "786617",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
  },
  "cvss" : {
    "cvss_base_score" : "5.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-407",
  "details" : [ "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.", "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2012-06-13T00:00:00Z",
    "advisory" : "RHSA-2012:0731",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "expat-0:1.95.8-11.el5_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2012-06-13T00:00:00Z",
    "advisory" : "RHSA-2012:0731",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "expat-0:2.0.1-11.el6_2"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.4",
    "release_date" : "2017-11-16T00:00:00Z",
    "advisory" : "RHSA-2017:3239",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
  }, {
    "product_name" : "Red Hat JBoss Web Server 2.1",
    "release_date" : "2016-01-21T00:00:00Z",
    "advisory" : "RHSA-2016:0062",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2.1",
    "package" : "expat"
  }, {
    "product_name" : "Text-Only JBCS",
    "release_date" : "2016-12-15T00:00:00Z",
    "advisory" : "RHSA-2016:2957",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Directory Server 8",
    "fix_state" : "Affected",
    "package_name" : "expat",
    "cpe" : "cpe:/a:redhat:directory_server:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "fix_state" : "Will not fix",
    "package_name" : "expat",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "xmlrpc-c",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "compat-expat1",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Affected",
    "package_name" : "mingw32-expat",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6",
    "fix_state" : "Affected",
    "package_name" : "expat",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 3",
    "fix_state" : "Affected",
    "package_name" : "expat",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-0876\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-0876" ],
  "name" : "CVE-2012-0876",
  "csaw" : false
}