Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-1885

Опубликовано: 11 авг. 2009
Источник: debian
EPSS Средний

Описание

Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xerces-cfixed3.0.1-2package
xerces-cno-dsaetchpackage
xerces-cno-dsalennypackage
xerces-c2fixed2.8.0+deb1-2package
xerces-c2fixed2.8.0-3+lenny1lennypackage
xerces27removedpackage
xerces27no-dsaetchpackage

EPSS

Процентиль: 94%
0.14118
Средний

Связанные уязвимости

ubuntu
больше 16 лет назад

Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.

redhat
больше 16 лет назад

Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.

nvd
больше 16 лет назад

Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.

github
почти 4 года назад

Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.

EPSS

Процентиль: 94%
0.14118
Средний
Уязвимость CVE-2009-1885