Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libxerces-c-dev",
"binary_version": "3.1.1-5.1+deb8u3build0.14.04.1"
},
{
"binary_name": "libxerces-c-samples",
"binary_version": "3.1.1-5.1+deb8u3build0.14.04.1"
},
{
"binary_name": "libxerces-c3.1",
"binary_version": "3.1.1-5.1+deb8u3build0.14.04.1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "libxerces-c-dev",
"binary_version": "3.1.3+debian-1ubuntu0.1~esm1"
},
{
"binary_name": "libxerces-c-samples",
"binary_version": "3.1.3+debian-1ubuntu0.1~esm1"
},
{
"binary_name": "libxerces-c3.1",
"binary_version": "3.1.3+debian-1ubuntu0.1~esm1"
}
]
}