First published: Wed Jun 22 2016(Updated: )
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xerces-c | 3.2.2+debian-1+deb10u1 3.2.3+debian-3 3.2.4+debian-1 | |
Apache Xerces-c\+\+ | <=3.1.3 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.