CVE-2016-4463
xerces-c: Stack overflow when parsing deeply nested DTD
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Desbordamiento de buffer basado en pila en Apache Xerces-C++ en versiones anteriores a 3.1.4 permite a atacantes dependientes del contexto provocar una denegación de servicio a través de un DTD anidado profundamente.
A stack exhaustion flaw was found in the way Xerces-C XML parser handled deeply nested DTDs. An attacker could potentially use this flaw to crash an application using Xerces-C by tricking it into processing specially crafted data.
Xerces-C is a validating XML parser written in a portable subset of C++. Xerces-C makes it easy to give your application the ability to read and write XML data. A shared library is provided for parsing, generating, manipulating, and validating XML documents. Issues addressed include a stack overflow vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-05-02 CVE Reserved
- 2016-06-29 CVE Published
- 2018-07-10 First Exploit
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html | X_refsource_misc |
|
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | X_refsource_confirm |
|
http://www.securityfocus.com/archive/1/538784/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/91501 | Vdb Entry | |
http://www.securitytracker.com/id/1036211 | Vdb Entry | |
http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt | X_refsource_confirm | |
https://issues.apache.org/jira/browse/XERCESC-2069 | X_refsource_confirm | |
https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069 | X_refsource_confirm | |
https://www.oracle.com/security-alerts/cpuapr2020.html | X_refsource_misc |
|
URL | Date | SRC |
---|---|---|
https://github.com/arntsonl/CVE-2016-4463 | 2018-07-10 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html | 2023-02-12 | |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:3335 | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:3506 | 2023-02-12 | |
https://access.redhat.com/errata/RHSA-2018:3514 | 2023-02-12 | |
https://www.debian.org/security/2016/dsa-3610 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2016-4463 | 2018-11-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1348845 | 2018-11-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Xerces-c\+\+ Search vendor "Apache" for product "Xerces-c\+\+" | <= 3.1.3 Search vendor "Apache" for product "Xerces-c\+\+" and version " <= 3.1.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|