Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8176: Uncontrolled Recursion

0
High
VulnerabilityCVE-2024-8176cvecve-2024-8176
Published: Fri Mar 14 2025 (03/14/2025, 08:19:48 UTC)
Source: CVE

Description

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/22/2026, 22:39:36 UTC

Technical Analysis

CVE-2024-8176 describes a vulnerability in libexpat where recursive entity expansion in XML documents is not properly restricted, allowing an attacker to cause uncontrolled recursion and stack overflow. This can crash applications using libexpat or potentially lead to memory corruption. The vulnerability has a CVSS 3.1 base score of 7.5 (high) with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts availability. Red Hat advisories confirm the issue and provide patches in updated packages for Red Hat JBoss Core Services Apache HTTP Server and Red Hat Enterprise Linux 9.4 Extended Update Support. The vendor advisories include detailed remediation instructions and confirm the availability of fixes.

Potential Impact

The vulnerability can cause denial of service by crashing applications that parse maliciously crafted XML documents with deeply nested entity references. In some environments, it may also lead to exploitable memory corruption. The impact is limited to availability and potentially integrity depending on exploitation. There are no confirmed reports of active exploitation in the wild. The vulnerability affects software using libexpat, including Red Hat JBoss Core Services and Red Hat Enterprise Linux distributions.

Mitigation Recommendations

Official patches are available from Red Hat for affected products, including Red Hat JBoss Core Services Apache HTTP Server 2.4.62 SP1 and Red Hat Enterprise Linux 9.4 Extended Update Support. Users should apply these updates as soon as possible following vendor guidance. The vendor advisories provide detailed instructions and download links for the updated packages. No additional mitigation is required beyond applying the official fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-08-26T12:36:40.985Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED
Vendor Advisory Urls
[{"url":"https://access.redhat.com/errata/RHSA-2025:13681","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22033","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22034","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22035","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22607","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22785","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22842","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:22871","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:3531","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:3734","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:3913","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4048","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4446","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4447","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4448","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:4449","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:7444","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:7512","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2025:8385","vendor":"Red Hat"},{"url":"https://access.redhat.com/security/cve/CVE-2024-8176","vendor":"Red Hat"},{"url":"https://www.kb.cert.org/vuls/id/760160","vendor":"CERT"}]

Threat ID: 682cd0fc1484d88663aecbac

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 4/22/2026, 10:39:36 PM

Last updated: 5/9/2026, 2:47:11 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses