The XML parser in Xerces-C++ before 3.0.0 allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during validation of an XML file.
2008-10-08T02:00:01.267
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.8 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | xerces-c\+\+ | ≤ 2.8.0 | Yes |
Application | apache | xerces-c\+\+ | 1.0.0 | Yes |
Application | apache | xerces-c\+\+ | 1.0.1 | Yes |
Application | apache | xerces-c\+\+ | 1.1.0 | Yes |
Application | apache | xerces-c\+\+ | 1.2.0 | Yes |
Application | apache | xerces-c\+\+ | 1.3.0 | Yes |
Application | apache | xerces-c\+\+ | 1.4.0 | Yes |
Application | apache | xerces-c\+\+ | 1.5.0 | Yes |
Application | apache | xerces-c\+\+ | 1.6.0 | Yes |
Application | apache | xerces-c\+\+ | 1.7.0 | Yes |
Application | apache | xerces-c\+\+ | 2.0.0 | Yes |
Application | apache | xerces-c\+\+ | 2.1.0 | Yes |
Application | apache | xerces-c\+\+ | 2.2.0 | Yes |
Application | apache | xerces-c\+\+ | 2.3.0 | Yes |
Application | apache | xerces-c\+\+ | 2.4.0 | Yes |
Application | apache | xerces-c\+\+ | 2.5.0 | Yes |
Application | apache | xerces-c\+\+ | 2.6.0 | Yes |
Application | apache | xerces-c\+\+ | 2.7.0 | Yes |