Stack-based buffer overflow in the XML Signature Reference functionality (xsec/dsig/DSIGReference.cpp) in Apache Santuario XML Security for C++ (aka xml-security-c) prior to 1.7.1 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions, probably related to the DSIGReference::getURIBaseTXFM function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache xml security for c\\+\\+ 1.6.0 |
||
apache xml security for c\\+\\+ 1.1.0 |
||
apache xml security for c\\+\\+ 1.6.1 |
||
apache xml security for c\\+\\+ 1.2.1 |
||
apache xml security for c\\+\\+ 1.5.1 |
||
apache xml security for c\\+\\+ 1.5.0 |
||
apache xml security for c\\+\\+ 0.2.0 |
||
apache xml security for c\\+\\+ 1.3.0 |
||
apache xml security for c\\+\\+ |
||
apache xml security for c\\+\\+ 1.4.0 |
||
apache xml security for c\\+\\+ 1.3.1 |
||
apache xml security for c\\+\\+ 1.2.0 |
||
apache xml security for c\\+\\+ 0.1.0 |