FreeBSD : xercesi-c3 -- multiple vulnerabilities (cb09a7aa-5344-11e6-a7bd-14dae9d210b8)

critical Nessus Plugin ID 92575

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Apache reports :

The Xerces-C XML parser fails to successfully parse a DTD that is deeply nested, and this causes a stack overflow, which makes a denial of service attack against many applications possible by an unauthenticated attacker.

Also, CVE-2016-2099: Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.

Solution

Update the affected package.

See Also

https://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt

https://www.openwall.com/lists/oss-security/2016/05/09/7

http://www.nessus.org/u?4cf055f1

Plugin Details

Severity: Critical

ID: 92575

File Name: freebsd_pkg_cb09a7aa534411e6a7bd14dae9d210b8.nasl

Version: 2.5

Type: local

Published: 7/27/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xerces-c3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/26/2016

Vulnerability Publication Date: 5/9/2016

Reference Information

CVE: CVE-2016-2099, CVE-2016-4463