Vulnerability & Exploit Database

Back to search

RHSA-2014:1319: xerces-j2 security update

Severity CVSS Published Added Modified
7 (AV:N/AC:M/Au:N/C:N/I:N/A:C) July 23, 2013 September 30, 2014 July 04, 2017


Apache Xerces for Java (Xerces-J) is a high performance, standardscompliant, validating XML parser written in Java. The xerces-j2 packagesprovide Xerces-J version 2.A resource consumption issue was found in the way Xerces-J handled XMLdeclarations. A remote attacker could use an XML document with a speciallycrafted declaration using a long pseudo-attribute name that, when parsed byan application using Xerces-J, would cause that application to use anexcessive amount of CPU. (CVE-2013-4002)All xerces-j2 users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. Applications using theXerces-J must be restarted for this update to take effect.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities