CVE-2024-23807

The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:*

History

16 Jan 2025, 17:51

Type Values Removed Values Added
References () https://github.com/apache/xerces-c/pull/54 - () https://github.com/apache/xerces-c/pull/54 - Exploit, Patch, Third Party Advisory
References () https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r - () https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r - Mailing List, Vendor Advisory
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 9.8
First Time Apache xerces-c\+\+
Apache
CPE cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:*

Information

Published : 2024-02-29 01:44

Updated : 2025-01-16 17:51


NVD link : CVE-2024-23807

Mitre link : CVE-2024-23807

CVE.ORG link : CVE-2024-23807


JSON object : View

Products Affected

apache

  • xerces-c\+\+
CWE
CWE-416

Use After Free