Description
The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
Exploits (1)
References (15)
Core 15
Core References
Mailing List, Third Party Advisory
https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2022.html
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/
Vendor Advisory mailing-list
https://lists.apache.org/thread.html/r48ea463fde218b1e4cc1a1d05770a0cea34de0600b4355315a49226b%40%3Cc-dev.xerces.apache.org%3E
Third Party Advisory vendor-advisory
https://access.redhat.com/errata/RHSA-2020:0704
Third Party Advisory vendor-advisory
https://access.redhat.com/errata/RHSA-2020:0702
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2020/12/msg00025.html
Third Party Advisory vendor-advisory
https://www.debian.org/security/2020/dsa-4814
Issue Tracking mailing-list
https://lists.apache.org/thread.html/rabbcc0249de1dda70cda96fd9bcff78217be7a57d96e7dcc8cd96646%40%3Cc-users.xerces.apache.org%3E
Issue Tracking mailing-list
https://lists.apache.org/thread.html/rfeb8abe36bcca91eb603deef49fbbe46870918830a66328a780b8625%40%3Cc-users.xerces.apache.org%3E
Issue Tracking mailing-list
https://lists.apache.org/thread.html/r90ec105571622a7dc3a43b846c12732d2e563561dfb2f72941625f35%40%3Cc-users.xerces.apache.org%3E
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7A6WWL4SWKAVYK6VK5YN7KZP4MZWC7IY/
Mailing List, Third Party Advisory vendor-advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/
Mailing List, Third Party Advisory mailing-list
https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html
Mailing List, Third Party Advisory mailing-list
http://www.openwall.com/lists/oss-security/2024/02/16/1
Scores
CVSS v3
8.1
EPSS
0.0417
EPSS Percentile
88.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-416
Status
published
Products (15)
apache/xerces-c\+\+
3.0.0 - 3.2.5
debian/debian_linux
9.0
debian/debian_linux
10.0
fedoraproject/fedora
38
fedoraproject/fedora
39
oracle/goldengate
< 21.4.0.0.0
redhat/enterprise_linux_desktop
6.0
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_eus
7.7
redhat/enterprise_linux_server
6.0
... and 5 more
Published
Dec 18, 2019
Tracked Since
Feb 18, 2026