CVE-2016-4463

Published on: 07/08/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Xerces-c from Apache contain the following vulnerability:

Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.

  • CVE-2016-4463 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
No Description Provided cve.report (archive)
text/html
URL Logo BID 91501
Apache Xerces-C XML Parser Crash ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html
Release Notes - ASF JIRA issues.apache.org
text/html
URL Logo CONFIRM issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069
CPU July 2018 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2018:3514
xerces.apache.org
text/plain
CONFIRM xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt
openSUSE-SU-2016:2232-1: moderate: Security update for xerces-c lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:2232
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2018:3506
SecurityFocus www.securityfocus.com
text/html
URL Logo BUGTRAQ 20160629 CVE-2016-4463: Apache Xerces-C XML Parser Crashes on Malformed DTD
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2018:3335
Apache Xerces DTD Parsing Stack Overflow Lets Remote Users Cause the Target Application to Crash - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036211
Debian -- Security Information -- DSA-3610-1 xerces-c www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3610
openSUSE-SU-2016:1808-1: moderate: Security update for xerces-c lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1808
Oracle Critical Patch Update Advisory - April 2020 www.oracle.com
text/html
URL Logo N/A N/A
[XERCESC-2069] Stack overflow in 3.1.3 - ASF JIRA issues.apache.org
text/html
URL Logo CONFIRM issues.apache.org/jira/browse/XERCESC-2069

Exploit/POC from Github

Proof of concept for CVE-2016-4463

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheXerces-c AllAllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
  • cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*: