Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2016-0729
Description:Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.
Test IDs: 1.3.6.1.4.1.25623.1.0.122894   1.3.6.1.4.1.25623.1.0.703493   1.3.6.1.4.1.25623.1.0.131249   1.3.6.1.4.1.25623.1.0.882418   1.3.6.1.4.1.25623.1.0.871572   1.3.6.1.4.1.25623.1.0.807909   1.3.6.1.4.1.25623.1.0.807795   1.3.6.1.4.1.25623.1.1.2.2016.1004   1.3.6.1.4.1.25623.1.1.4.2016.1026.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2016-0729
BugTraq ID: 83423
http://www.securityfocus.com/bid/83423
Bugtraq: 20160225 CVE-2016-0729: Apache Xerces-C XML Parser Crashes on Malformed Input (Google Search)
http://www.securityfocus.com/archive/1/537620/100/0/threaded
Debian Security Information: DSA-3493 (Google Search)
http://www.debian.org/security/2016/dsa-3493
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182597.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182062.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182131.html
https://security.gentoo.org/glsa/201612-46
http://packetstormsecurity.com/files/135949/Apache-Xerces-C-XML-Parser-Buffer-Overflow.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
http://www.securitytracker.com/id/1035113
SuSE Security Announcement: openSUSE-SU-2016:0966 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html
SuSE Security Announcement: openSUSE-SU-2016:1121 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-04/msg00086.html
SuSE Security Announcement: openSUSE-SU-2016:1808 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html




© 1998-2024 E-Soft Inc. All rights reserved.