ID CVE-2016-2099
Summary Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
References
Vulnerable Configurations
  • cpe:2.3:a:apache:xerces-c\+\+:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:1.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:1.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:2.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:2.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:xerces-c\+\+:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:xerces-c\+\+:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 30-10-2018 - 16:27)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 90502
confirm
debian DSA-3579
gentoo GLSA-201612-46
mlist [oss-security] 20160509 CVE-2016-2099: use-after-free in Xerces 3.1.3
suse
  • openSUSE-SU-2016:1744
  • openSUSE-SU-2016:1808
  • openSUSE-SU-2016:2232
Last major update 30-10-2018 - 16:27
Published 13-05-2016 - 14:59
Last modified 30-10-2018 - 16:27
Back to Top