7.5
CVSSv2

CVE-2016-0729

Published: 07/04/2016 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C prior to 3.1.3 allow remote malicious users to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache xerces-c\\\\\\+\\\\\\+

fedoraproject fedora 22

fedoraproject fedora 23

fedoraproject fedora 24

Vendor Advisories

Debian Bug report logs - #815907 xerces-c: CVE-2016-0729 Package: src:xerces-c; Maintainer for src:xerces-c is William Blough <bblough@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 25 Feb 2016 15:03:02 UTC Severity: grave Tags: fixed-upstream, patch, security, upstream Found in versio ...
Gustavo Grieco discovered that xerces-c, a validating XML parser library for C++, mishandles certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting These flaws could lead to a denial of service in applications using the xerces-c library, or potentially, to the execution of arbitrary code Fo ...