The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/45596 | vdb entry |
http://www.securityfocus.com/bid/31533 | patch vdb entry |
http://xerces.apache.org/xerces-c/releases.html | |
http://secunia.com/advisories/32108 | third party advisory vendor advisory |
http://issues.apache.org/jira/browse/XERCESC-1051 | exploit |