CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
AI Score
Confidence
High
EPSS
Percentile
68.0%
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | xerces-c\+\+ | * | cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.0.0 | cpe:2.3:a:apache:xerces-c\+\+:1.0.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.0.1 | cpe:2.3:a:apache:xerces-c\+\+:1.0.1:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.1.0 | cpe:2.3:a:apache:xerces-c\+\+:1.1.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.2.0 | cpe:2.3:a:apache:xerces-c\+\+:1.2.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.3.0 | cpe:2.3:a:apache:xerces-c\+\+:1.3.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.4.0 | cpe:2.3:a:apache:xerces-c\+\+:1.4.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.5.0 | cpe:2.3:a:apache:xerces-c\+\+:1.5.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.6.0 | cpe:2.3:a:apache:xerces-c\+\+:1.6.0:*:*:*:*:*:*:* |
apache | xerces-c\+\+ | 1.7.0 | cpe:2.3:a:apache:xerces-c\+\+:1.7.0:*:*:*:*:*:*:* |