Описание
Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.6.1-7 |
lucid | ignored | end of life |
precise | released | 1.6.1-1ubuntu0.1 |
quantal | released | 1.6.1-7~build0.12.10.1 |
raring | released | 1.6.1-7~build0.13.04.1 |
upstream | released | 1.6.1-7, 1.7.2 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.
Heap-based buffer overflow in the XML Signature Reference functionalit ...
Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2