FreeBSD : xercesi-c3 -- multiple vulnerabilities (cb09a7aa-5344-11e6-a7bd-14dae9d210b8)

Critical Nessus Plugin ID 92575


The remote FreeBSD host is missing a security-related update.


Apache reports :

The Xerces-C XML parser fails to successfully parse a DTD that is deeply nested, and this causes a stack overflow, which makes a denial of service attack against many applications possible by an unauthenticated attacker.

Also, CVE-2016-2099: Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 92575

File Name: freebsd_pkg_cb09a7aa534411e6a7bd14dae9d210b8.nasl

Version: $Revision: 2.2 $

Type: local

Published: 2016/07/27

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:xerces-c3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2016/07/26

Vulnerability Publication Date: 2016/05/09

Reference Information

CVE: CVE-2016-2099, CVE-2016-4463