CVE-2024-23807

The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:*

History

16 Jan 2025, 17:51

Type Values Removed Values Added
CPE cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-416
References () https://github.com/apache/xerces-c/pull/54 - () https://github.com/apache/xerces-c/pull/54 - Exploit, Patch, Third Party Advisory
References () https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r - () https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r - Patch, Vendor Advisory
First Time Apache
Apache xerces-c\+\+

29 Feb 2024, 01:44

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-29 01:44

Updated : 2025-01-16 17:51


NVD link : CVE-2024-23807

Mitre link : CVE-2024-23807


JSON object : View

Products Affected

apache

  • xerces-c\+\+
CWE

No CWE.