CVE-2013-2210

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.

References

http://www.debian.org/security/2013/dsa-2717

http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html

http://santuario.apache.org/secadv.data/CVE-2013-2210.txt

https://www.tenable.com/security/tns-2018-15

https://lists.apache.org/thread.html/[email protected]%3Ccommits.santuario.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.santuario.apache.org%3E

Details

Source: MITRE

Published: 2013-08-20

Updated: 2021-09-17

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
119149Tenable SecurityCenter < 5.8.0 Multiple Vulnerabilities (TNS-2018-15)NessusMisc.
critical
67103FreeBSD : apache-xml-security-c -- heap overflow during XPointer evaluation (81da673e-dfe1-11e2-9389-08002798f6ff)NessusFreeBSD Local Security Checks
high
67102Debian DSA-2717-1 : xml-security-c - heap overflowNessusDebian Local Security Checks
high