First published: Wed Jun 22 2016(Updated: )
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xerces-c | 3.2.2+debian-1+deb10u1 3.2.3+debian-3 3.2.4+debian-1 | |
Apache Xerces-C++ | <=3.1.3 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4463 has been classified as a medium severity vulnerability due to its potential to cause denial of service.
To fix CVE-2016-4463, upgrade Apache Xerces-C++ to version 3.1.4 or later.
CVE-2016-4463 affects versions of Apache Xerces-C++ prior to 3.1.4 that are utilized in applications handling XML DTDs.
CVE-2016-4463 is a stack-based buffer overflow vulnerability.
Exploiting CVE-2016-4463 can lead to a denial of service, causing applications to crash when processing deeply nested DTDs.