CVE-2009-1885

Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
References
Link Resource
http://secunia.com/advisories/36201 Vendor Advisory
http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch
http://svn.apache.org/viewvc?view=rev&revision=781488 Exploit
http://www.cert.fi/en/reports/2009/vulnerability2009085.html
http://www.codenomicon.com/labs/xml/
http://www.mandriva.com/security/advisories?name=MDVSA-2009:223
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
http://www.securityfocus.com/bid/35986
http://www.vupen.com/english/advisories/2009/2196 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=515515 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/52321
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01001.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01099.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01136.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01150.html
http://secunia.com/advisories/36201 Vendor Advisory
http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch
http://svn.apache.org/viewvc?view=rev&revision=781488 Exploit
http://www.cert.fi/en/reports/2009/vulnerability2009085.html
http://www.codenomicon.com/labs/xml/
http://www.mandriva.com/security/advisories?name=MDVSA-2009:223
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
http://www.securityfocus.com/bid/35986
http://www.vupen.com/english/advisories/2009/2196 Patch Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=515515 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/52321
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01001.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01099.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01136.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01150.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:xerces-c\+\+:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:xerces-c\+\+:2.8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://secunia.com/advisories/36201 - Vendor Advisory () http://secunia.com/advisories/36201 - Vendor Advisory
References () http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch - () http://svn.apache.org/viewvc/xerces/c/trunk/src/xercesc/validators/DTD/DTDScanner.cpp?r1=781488&r2=781487&pathrev=781488&view=patch -
References () http://svn.apache.org/viewvc?view=rev&revision=781488 - Exploit () http://svn.apache.org/viewvc?view=rev&revision=781488 - Exploit
References () http://www.cert.fi/en/reports/2009/vulnerability2009085.html - () http://www.cert.fi/en/reports/2009/vulnerability2009085.html -
References () http://www.codenomicon.com/labs/xml/ - () http://www.codenomicon.com/labs/xml/ -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:223 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:223 -
References () http://www.networkworld.com/columnists/2009/080509-xml-flaw.html - () http://www.networkworld.com/columnists/2009/080509-xml-flaw.html -
References () http://www.securityfocus.com/bid/35986 - () http://www.securityfocus.com/bid/35986 -
References () http://www.vupen.com/english/advisories/2009/2196 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/2196 - Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=515515 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=515515 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/52321 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/52321 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01001.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01001.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01099.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01099.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01136.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01136.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01150.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01150.html -

Information

Published : 2009-08-11 18:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1885

Mitre link : CVE-2009-1885

CVE.ORG link : CVE-2009-1885


JSON object : View

Products Affected

apache

  • xerces-c\+\+
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer