EulerOS 2.0 SP3 : xerces-c (EulerOS-SA-2018-1160)
High Nessus Plugin ID 110736
SynopsisThe remote EulerOS host is missing multiple security updates.
DescriptionAccording to the versions of the xerces-c package installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :
- Xerces-C is a validating XML parser written in a portable subset of C++. Xerces-C makes it easy to give your application the ability to read and write XML data. A shared library is provided for parsing, generating, manipulating, and validating XML documents.
Xerces-C is faithful to the XML 1.0 recommendation and associated standards: XML 1.0 (Third Edition), XML 1.1 (First Edition), DOM Level 1, 2, 3 Core, DOM Level 2.0 Traversal and Range,DOM Level 3.0 Load and Save, SAX 1.0 and SAX 2.0, Namespaces in XML, Namespaces in XML 1.1, XML Schema, XML Inclusions).
- Security fix(es):
- In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions.(CVE-2017-12627)
Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected xerces-c packages.