CVE-2008-4482
08.10.2008, 02:00
The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.Enginsight
Vendor | Product | Version |
---|---|---|
apache | xerces-c\+\+ | 𝑥 ≤ 2.8.0 |
apache | xerces-c\+\+ | 1.0.0 |
apache | xerces-c\+\+ | 1.0.1 |
apache | xerces-c\+\+ | 1.1.0 |
apache | xerces-c\+\+ | 1.2.0 |
apache | xerces-c\+\+ | 1.3.0 |
apache | xerces-c\+\+ | 1.4.0 |
apache | xerces-c\+\+ | 1.5.0 |
apache | xerces-c\+\+ | 1.6.0 |
apache | xerces-c\+\+ | 1.7.0 |
apache | xerces-c\+\+ | 2.0.0 |
apache | xerces-c\+\+ | 2.1.0 |
apache | xerces-c\+\+ | 2.2.0 |
apache | xerces-c\+\+ | 2.3.0 |
apache | xerces-c\+\+ | 2.4.0 |
apache | xerces-c\+\+ | 2.5.0 |
apache | xerces-c\+\+ | 2.6.0 |
apache | xerces-c\+\+ | 2.7.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References