CVE-2016-0729
Summary
| CVE | CVE-2016-0729 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-04-07 21:59:00 UTC |
| Updated | 2018-10-17 01:29:00 UTC |
| Description | Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Xerces-c | All | All | All | All |
| Application | Apache | Xerces-c | All | All | All | All |
| Operating System | Fedoraproject | Fedora | 22 | All | All | All |
| Operating System | Fedoraproject | Fedora | 23 | All | All | All |
| Operating System | Fedoraproject | Fedora | 24 | All | All | All |
| Operating System | Fedoraproject | Fedora | 22 | All | All | All |
| Operating System | Fedoraproject | Fedora | 23 | All | All | All |
| Operating System | Fedoraproject | Fedora | 24 | All | All | All |
| Operating System | Samsung | X14j Firmware | t-ms14jakucb-1102.5 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [XERCESC-2061] Buffer overruns in prolog parsing and error handling - ASF JIRA | CONFIRM | issues.apache.org | Vendor Advisory |
| Apache Xerces-C XML Parser Buffer Overflow ≈ Packet Storm | MISC | packetstormsecurity.com | |
| openSUSE-SU-2016:0966-1: moderate: Security update for xerces-c | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 24 Update: xerces-c-3.1.3-1.fc24 | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| Xerces-C++: Multiple vulnerabilities (GLSA 201612-46) — Gentoo security | GENTOO | security.gentoo.org | |
| Apache Xerces-C Buffer Overflow Lets Remote Users Deny Service or Potentially Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | |
| [SECURITY] Fedora 23 Update: xerces-c-3.1.3-1.fc23 | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| [Apache-SVN] Revision 1727978 | CONFIRM | svn.apache.org | |
| xerces.apache.org/xerces-c/secadv/CVE-2016-0729.txt | CONFIRM | xerces.apache.org | Vendor Advisory |
| [SECURITY] Fedora 22 Update: xerces-c-3.1.3-1.fc22 | FEDORA | lists.fedoraproject.org | Third Party Advisory |
| openSUSE-SU-2016:1121-1: moderate: Security update for xerces-c | SUSE | lists.opensuse.org | |
| Oracle Linux Bulletin - January 2016 | CONFIRM | www.oracle.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| CPU Oct 2018 | CONFIRM | www.oracle.com | |
| Oracle Critical Patch Update - October 2019 | MISC | www.oracle.com | |
| openSUSE-SU-2016:1808-1: moderate: Security update for xerces-c | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3493-1 xerces-c | DEBIAN | www.debian.org | Third Party Advisory |
| 83423 | BID | www.securityfocus.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.