xerces-c: code execution
Package(s): | xerces-c | CVE #(s): | CVE-2016-0729 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Created: | February 26, 2016 | Updated: | April 18, 2016 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description: | From the Debian-LTS advisory: Gustavo Grieco discovered that xerces-c, a validating XML parser library for C++, mishandles certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting. These flaws could lead to a denial of service in applications using the xerces-c library, or potentially, to the execution of arbitrary code. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|