vulnerability
Arch Linux: Arbitrary code execution (CVE-2017-12627)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Mar 1, 2018 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Mar 1, 2018
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
The Xerces-C XML parser mishandles certain kinds of external DTD references, resulting in dereference of a NULL pointer while processing the path to the DTD. The bug allows for a denial of service attack in applications that allow DTD processing and do not prevent external DTD usage, and could conceivably result in remote code execution.
Solution
arch-linux-upgrade-latest
References
- CVE-2017-12627
- https://attackerkb.com/topics/CVE-2017-12627
- URL-http://seclists.org/oss-sec/2018/q1/203
- URL-http://www.securityfocus.com/bid/103219
- URL-http://xerces.apache.org/xerces-c/secadv/CVE-2017-12627.txt
- URL-https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- URL-https://lists.debian.org/debian-lts-announce/2018/03/msg00032.html
- URL-https://security.archlinux.org/ASA-201803-23
- CWE-476
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.