The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://issues.apache.org/jira/browse/XERCESC-1051 - Exploit | |
References | () http://secunia.com/advisories/32108 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/31533 - Patch | |
References | () http://xerces.apache.org/xerces-c/releases.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/45596 - |
Information
Published : 2008-10-08 02:00
Updated : 2024-11-21 00:51
NVD link : CVE-2008-4482
Mitre link : CVE-2008-4482
CVE.ORG link : CVE-2008-4482
JSON object : View
Products Affected
apache
- xerces-c\+\+
CWE
CWE-20
Improper Input Validation