vulnerability
Oracle Linux: CVE-2016-4463: ELSA-2018-3335: xerces-c security update (MODERATE) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:H/Au:N/C:N/I:N/A:C) | Jun 29, 2016 | Nov 6, 2018 | Jan 7, 2025 |
Severity
4
CVSS
(AV:L/AC:H/Au:N/C:N/I:N/A:C)
Published
Jun 29, 2016
Added
Nov 6, 2018
Modified
Jan 7, 2025
Description
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
A stack exhaustion flaw was found in the way Xerces-C XML parser handled deeply nested DTDs. An attacker could potentially use this flaw to crash an application using Xerces-C by tricking it into processing specially crafted data.
A stack exhaustion flaw was found in the way Xerces-C XML parser handled deeply nested DTDs. An attacker could potentially use this flaw to crash an application using Xerces-C by tricking it into processing specially crafted data.
Solution(s)
oracle-linux-upgrade-xerces-coracle-linux-upgrade-xerces-c-develoracle-linux-upgrade-xerces-c-doc

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.