First published: Fri Feb 16 2024(Updated: )
Apache Xerces C++ XML parser could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free flaw during the scanning of external DTDs. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Xerces-C++ | >=3.0.0<3.2.5 | |
IBM Spectrum Protect for Virtual Environments: Data Protection for VMware | <=8.1.0.0 - 8.1.22.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23807 has a high severity rating, allowing remote code execution due to a use-after-free flaw in Apache Xerces C++.
CVE-2024-23807 affects Apache Xerces-C++ versions 3.0.0 to 3.2.5 and IBM Spectrum Protect for Virtual Environments versions up to 8.1.22.0.
To fix CVE-2024-23807, upgrade Apache Xerces-C++ to version 3.2.6 or later, or apply patches provided by relevant vendors.
An attacker exploiting CVE-2024-23807 could execute arbitrary code on the system by sending specially crafted requests.
No specific workarounds are documented for CVE-2024-23807, and the recommended action is to upgrade or patch the affected software.