发布时间: 2024年2月23日
修改时间: 2024年10月31日
The Apache Xerces-C 3.0.0 to 3.2.2 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Network | Network |
CVSS评分 | 8.1 | 8.1 |
Attack Complexity | High | High |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-1495 | xerces-c security update | 2024年2月23日 |
KylinSec-SA-2024-1558 | xerces-c security update | 2024年3月1日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | xerces-c | Fixed |
KY3.4-5A | xerces-c | Fixed |
KY3.5.1 | xerces-c | Fixed |
KY3.5.2 | xerces-c | Fixed |