First published: Tue Aug 04 2009(Updated: )
A stack overflow flaw was found in Apache Xerces by parsing root XML document element DTD definition. Providing a specially-crafted XML file would lead to excessive stack growth and denial of service (crash), when opened by a victim. Upstream patch: --------------- <a href="http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch">http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch</a> Credit: ------- The flaw was discovered by Jukka Taimisto and Rauli Kaksonen from the CROSS project at Codenomicon Ltd.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Xerces-C++ | =2.7.0 | |
Apache Xerces-C++ | =2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1885 has been classified as a moderate severity vulnerability due to its potential to cause denial of service.
To fix CVE-2009-1885, upgrade Apache Xerces-C++ to version 2.8.1 or later where the vulnerability has been patched.
CVE-2009-1885 affects Apache Xerces-C++ versions 2.7.0 and 2.8.0.
CVE-2009-1885 is a stack overflow vulnerability that can lead to excessive stack growth and application crash.
The issue in CVE-2009-1885 is caused by the parsing of a specially-crafted XML file containing root XML document element DTD definitions.