Описание
Stack-based buffer overflow in the XML Signature Reference functionality (xsec/dsig/DSIGReference.cpp) in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions, probably related to the DSIGReference::getURIBaseTXFM function.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.6.1-6 |
| lucid | released | 1.5.1-3+squeeze2build0.10.04.1 |
| precise | released | 1.6.1-1ubuntu0.1 |
| quantal | released | 1.6.1-6~build0.12.10.1 |
| raring | released | 1.6.1-6~build0.13.04.1 |
| upstream | released | 1.6.1-6 |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the XML Signature Reference functionality (xsec/dsig/DSIGReference.cpp) in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions, probably related to the DSIGReference::getURIBaseTXFM function.
Stack-based buffer overflow in the XML Signature Reference functionali ...
Stack-based buffer overflow in the XML Signature Reference functionality (xsec/dsig/DSIGReference.cpp) in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions, probably related to the DSIGReference::getURIBaseTXFM function.
EPSS
7.5 High
CVSS2