First published: Wed Oct 08 2008(Updated: )
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Xerces-c\+\+ | =1.5.0 | |
Apache Xerces-c\+\+ | =1.6.0 | |
Apache Xerces-c\+\+ | =2.0.0 | |
Apache Xerces-c\+\+ | =1.7.0 | |
Apache Xerces-c\+\+ | =2.6.0 | |
Apache Xerces-c\+\+ | =1.1.0 | |
Apache Xerces-c\+\+ | =1.0.0 | |
Apache Xerces-c\+\+ | =2.5.0 | |
Apache Xerces-c\+\+ | =2.4.0 | |
Apache Xerces-c\+\+ | =2.2.0 | |
Apache Xerces-c\+\+ | =2.7.0 | |
Apache Xerces-c\+\+ | =1.3.0 | |
Apache Xerces-c\+\+ | =1.2.0 | |
Apache Xerces-c\+\+ | =1.4.0 | |
Apache Xerces-c\+\+ | =2.1.0 | |
Apache Xerces-c\+\+ | =1.0.1 | |
Apache Xerces-c\+\+ | <=2.8.0 | |
Apache Xerces-c\+\+ | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.