Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) prior to 1.7.2 allows context-dependent malicious users to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache xml security for c++ 1.6.0 |
||
apache xml security for c++ 1.1.0 |
||
apache xml security for c++ 1.6.1 |
||
apache xml security for c++ 1.2.1 |
||
apache xml security for c++ 1.5.1 |
||
apache xml security for c++ 1.5.0 |
||
apache xml security for c++ 0.2.0 |
||
apache xml security for c++ 1.3.0 |
||
apache xml security for c++ 1.7.0 |
||
apache xml security for c++ |
||
apache xml security for c++ 1.4.0 |
||
apache xml security for c++ 1.3.1 |
||
apache xml security for c++ 1.2.0 |
||
apache xml security for c++ 0.1.0 |