FreeBSD : xercesi-c3 -- multiple vulnerabilities (cb09a7aa-5344-11e6-a7bd-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Apache reports :

The Xerces-C XML parser fails to successfully parse a DTD that is
deeply nested, and this causes a stack overflow, which makes a denial
of service attack against many applications possible by an
unauthenticated attacker.

Also, CVE-2016-2099: Use-after-free vulnerability in
validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier
allows context-dependent attackers to have unspecified impact via an
invalid character in an XML document.

See also :

https://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt
http://www.openwall.com/lists/oss-security/2016/05/09/7
http://www.nessus.org/u?5c2b44ff

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 92575 ()

Bugtraq ID:

CVE ID: CVE-2016-2099
CVE-2016-4463

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now