Lucene search

K
ubuntuUbuntuUSN-6590-1
HistoryJan 18, 2024 - 12:00 a.m.

Xerces-C++ vulnerabilities

2024-01-1800:00:00
ubuntu.com
14
xerces-c++
ubuntu
memory management
xml parser
use-after-free error
denial of service
arbitrary code execution
bounds checks
xml schema definition
out-of-bounds access
http request
cve-2018-1311
cve-2023-37536

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

79.7%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • xerces-c - Validating XML parser written in a portable subset of C++

Details

It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2018-1311)

It was discovered that Xerces-C++ was not properly performing bounds
checks when processing XML Schema Definition files, which could lead to an
out-of-bounds access via an HTTP request. If a user or automated system
were tricked into processing a specially crafted XSD file, a remote
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-37536)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchlibxerces-c-samples< 3.2.3+debian-3ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibxerces-c-dev< 3.2.3+debian-3ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibxerces-c-doc< 3.2.3+debian-3ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibxerces-c-samples-dbgsym< 3.2.3+debian-3ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibxerces-c3.2< 3.2.3+debian-3ubuntu0.1UNKNOWN
Ubuntu22.04noarchlibxerces-c3.2-dbgsym< 3.2.3+debian-3ubuntu0.1UNKNOWN
Ubuntu20.04noarchlibxerces-c-samples< 3.2.2+debian-1ubuntu0.2UNKNOWN
Ubuntu20.04noarchlibxerces-c-dev< 3.2.2+debian-1ubuntu0.2UNKNOWN
Ubuntu20.04noarchlibxerces-c-doc< 3.2.2+debian-1ubuntu0.2UNKNOWN
Ubuntu20.04noarchlibxerces-c-samples-dbgsym< 3.2.2+debian-1ubuntu0.2UNKNOWN
Rows per page:
1-10 of 351

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.007 Low

EPSS

Percentile

79.7%