The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-10-07 19:00
Updated : 2017-08-07 18:32
NVD link : CVE-2008-4482
Mitre link : CVE-2008-4482
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apache
- xerces-c\+\+