Vulnerability Description
Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed XPointer expressions. NOTE: this is due to an incorrect fix for CVE-2013-2154.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Xml Security For C\+\+ | <= 1.7.1 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html
- http://santuario.apache.org/secadv.data/CVE-2013-2210.txtVendor Advisory
- http://www.debian.org/security/2013/dsa-2717
- https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af1178
- https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3
- https://www.tenable.com/security/tns-2018-15
- http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0216.html
- http://santuario.apache.org/secadv.data/CVE-2013-2210.txtVendor Advisory
- http://www.debian.org/security/2013/dsa-2717
- https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af1178
- https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3
- https://www.tenable.com/security/tns-2018-15
FAQ
What is CVE-2013-2210?
CVE-2013-2210 is a vulnerability with a CVSS score of 7.5 (HIGH). Heap-based buffer overflow in the XML Signature Reference functionality in Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.2 allows context-dependent attackers to cause a denial ...
How severe is CVE-2013-2210?
CVE-2013-2210 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2210?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Xml Security For C\+\+.