Описание
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 3.2.0+debian-2 |
| cosmic | not-affected | 3.2.0+debian-2 |
| devel | not-affected | 3.2.0+debian-2 |
| disco | not-affected | 3.2.0+debian-2 |
| eoan | not-affected | 3.2.0+debian-2 |
| esm-apps/bionic | not-affected | 3.2.0+debian-2 |
| esm-apps/focal | not-affected | 3.2.0+debian-2 |
| esm-apps/jammy | not-affected | 3.2.0+debian-2 |
| esm-apps/xenial | released | 3.1.3+debian-1ubuntu0.1~esm1 |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows c ...
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
5 Medium
CVSS2
7.5 High
CVSS3