7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.031 Low
EPSS
Percentile
91.1%
CentOS Errata and Security Advisory CESA-2016:0430
Xerces-C is a validating XML parser written in a portable subset of C++.
It was discovered that the Xerces-C XML parser did not properly process
certain XML input. By providing specially crafted XML data to an
application using Xerces-C for XML processing, a remote attacker could
exploit this flaw to cause an application crash or, possibly, execute
arbitrary code with the privileges of the application. (CVE-2016-0729)
Red Hat would like to thank Gustavo Grieco for reporting this issue.
All xerces-c users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, all applications using Xerces-C must be restarted for the update
to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2016-March/083891.html
Affected packages:
xerces-c
xerces-c-devel
xerces-c-doc
Upstream details at:
https://access.redhat.com/errata/RHSA-2016:0430
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | i686 | xerces-c | < 3.1.1-8.el7_2 | xerces-c-3.1.1-8.el7_2.i686.rpm |
CentOS | 7 | x86_64 | xerces-c | < 3.1.1-8.el7_2 | xerces-c-3.1.1-8.el7_2.x86_64.rpm |
CentOS | 7 | i686 | xerces-c-devel | < 3.1.1-8.el7_2 | xerces-c-devel-3.1.1-8.el7_2.i686.rpm |
CentOS | 7 | x86_64 | xerces-c-devel | < 3.1.1-8.el7_2 | xerces-c-devel-3.1.1-8.el7_2.x86_64.rpm |
CentOS | 7 | noarch | xerces-c-doc | < 3.1.1-8.el7_2 | xerces-c-doc-3.1.1-8.el7_2.noarch.rpm |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.031 Low
EPSS
Percentile
91.1%