First published: Wed Oct 08 2008(Updated: )
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Xerces-C++ | =1.5.0 | |
Apache Xerces-C++ | =1.6.0 | |
Apache Xerces-C++ | =2.0.0 | |
Apache Xerces-C++ | =1.7.0 | |
Apache Xerces-C++ | =2.6.0 | |
Apache Xerces-C++ | =1.1.0 | |
Apache Xerces-C++ | =1.0.0 | |
Apache Xerces-C++ | =2.5.0 | |
Apache Xerces-C++ | =2.4.0 | |
Apache Xerces-C++ | =2.2.0 | |
Apache Xerces-C++ | =2.7.0 | |
Apache Xerces-C++ | =1.3.0 | |
Apache Xerces-C++ | =1.2.0 | |
Apache Xerces-C++ | =1.4.0 | |
Apache Xerces-C++ | =2.1.0 | |
Apache Xerces-C++ | =1.0.1 | |
Apache Xerces-C++ | <=2.8.0 | |
Apache Xerces-C++ | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4482 has a high severity rating due to the potential for denial of service attacks.
To fix CVE-2008-4482, upgrade your Xerces-C++ library to version 3.0.0 or later.
CVE-2008-4482 enables context-dependent denial of service attacks by causing stack consumption and crashes.
CVE-2008-4482 affects all versions of Xerces-C++ before 3.0.0.
The impact of CVE-2008-4482 on your system includes excessive memory consumption and application crashes during XML validation.