[manjaro-security] [arch-security] [ASA-201606-22] xerces-c: arbitrary code execution
rgacogne at archlinux.org
Sat Jun 25 18:47:48 CEST 2016
Arch Linux Security Advisory ASA-201606-22
Date : 2016-06-25
CVE-ID : CVE-2016-2099
Package : xerces-c
Type : arbitrary code execution
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package xerces-c before version 3.1.3-2 is vulnerable to arbitrary
Upgrade to 3.1.3-2.
# pacman -Syu "xerces-c>=3.1.3-2"
The problem has been fixed upstream in version 3.1.3.
The DTDScanner fails to account for the fact that peeking characters in
the XMLReader class can raise an exception if an invalid character is
encountered, and the exception crosses stack frames in an unsafe way
that causes a higher level exception handler to access an already-freed
A remote attacker might be able to cause a denial of service or execute
arbitrary code on the affected host by submitting a crafted DTD file.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: OpenPGP digital signature
More information about the manjaro-security