First published: Tue Aug 04 2009(Updated: )
A stack overflow flaw was found in Apache Xerces by parsing root XML document element DTD definition. Providing a specially-crafted XML file would lead to excessive stack growth and denial of service (crash), when opened by a victim. Upstream patch: --------------- <a href="http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch">http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch</a> Credit: ------- The flaw was discovered by Jukka Taimisto and Rauli Kaksonen from the CROSS project at Codenomicon Ltd.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Xerces-C++ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.