Your submission was sent successfully! Close

CVE-2016-2099

Published: 13 May 2016

Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.

From the Ubuntu security team

It was discovered that Xerces-C XML Parser mishandles certain kinds of external DTD references, resulting in a user-after-free. An attacker could use this vulnerability to cause a denial of service (crash) or possibly execute arbitrary code.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
xerces-c
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(3.1.3+debian-2)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(3.1.3+debian-2)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.1.3+debian-2)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(3.1.3+debian-2)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (3.1.1-5.1+deb8u2build0.14.04.1)
Patches:
Upstream: http://svn.apache.org/viewvc?view=revision&revision=1747619