SB2018100318 - Fedora 29 update for xerces-c27



SB2018100318 - Fedora 29 update for xerces-c27

Published: October 3, 2018 Updated: April 24, 2025

Security Bulletin ID SB2018100318
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) DTD parsing stack overflow (CVE-ID: CVE-2016-4463)

The vulnerability allows a remote attacker to cause the target application to crash.

The vulnerability exists due to boundary error when processing DTD files. A remote unauthenticated attacker can cause a stack-based buffer overflow in the xml parser library by creating a specially crafted DTD file.

Successful exploitation of this vulnerability may result in denial of service.

2) NULL pointer dereference (CVE-ID: CVE-2017-12627)

The vulnerability allows a remote attacker to cause DoS condition.

The weakness exists due to NULL pointer dereference. A remote attacker can cause the service to crash.

Remediation

Install update from vendor's website.