CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
83.8%
Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | xml_security_for_c%2B%2B | 0.1.0 | cpe:/a:apache:xml_security_for_c%2B%2B:0.1.0::: |
apache | xml_security_for_c%2B%2B | cpe:/a:apache:xml_security_for_c%2B%2B:::: | |
apache | xml_security_for_c%2B%2B | 1.2.0 | cpe:/a:apache:xml_security_for_c%2B%2B:1.2.0::: |
apache | xml_security_for_c%2B%2B | 1.5.1 | cpe:/a:apache:xml_security_for_c%2B%2B:1.5.1::: |
apache | xml_security_for_c%2B%2B | 1.3.1 | cpe:/a:apache:xml_security_for_c%2B%2B:1.3.1::: |
apache | xml_security_for_c%2B%2B | 1.6.1 | cpe:/a:apache:xml_security_for_c%2B%2B:1.6.1::: |
apache | xml_security_for_c%2B%2B | 1.5.0 | cpe:/a:apache:xml_security_for_c%2B%2B:1.5.0::: |
apache | xml_security_for_c%2B%2B | 1.2.1 | cpe:/a:apache:xml_security_for_c%2B%2B:1.2.1::: |
apache | xml_security_for_c%2B%2B | 1.3.0 | cpe:/a:apache:xml_security_for_c%2B%2B:1.3.0::: |
apache | xml_security_for_c%2B%2B | 1.6.0 | cpe:/a:apache:xml_security_for_c%2B%2B:1.6.0::: |
archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html
santuario.apache.org/secadv.data/CVE-2013-2210.txt
www.debian.org/security/2013/dsa-2717
lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E
lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E
www.tenable.com/security/tns-2018-15