CVE-2013-2154
Published: 20 August 2013
Stack-based buffer overflow in the XML Signature Reference functionality (xsec/dsig/DSIGReference.cpp) in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions, probably related to the DSIGReference::getURIBaseTXFM function.
Notes
Author | Note |
---|---|
jdstrand | incomplete fix for this introduces CVE-2013-2210 |
Priority
Status
Package | Release | Status |
---|---|---|
xml-security-c Launchpad, Ubuntu, Debian |
lucid |
Released
(1.5.1-3+squeeze2build0.10.04.1)
|
precise |
Released
(1.6.1-1ubuntu0.1)
|
|
quantal |
Released
(1.6.1-6~build0.12.10.1)
|
|
raring |
Released
(1.6.1-6~build0.13.04.1)
|
|
upstream |
Released
(1.6.1-6)
|
|
Patches: vendor: http://www.debian.org/security/2013/dsa-2710 |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |