HIGH · 8.1

CVE-2018-1311

The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library ...

Vulnerability Description

The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.

CVSS Score

8.1

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
ApacheXerces-C\+\+>= 3.0.0, < 3.2.5
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Eus7.7
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Aus7.7
RedhatEnterprise Linux Server Tus7.7
RedhatEnterprise Linux Workstation6.0
DebianDebian Linux9.0
OracleGoldengate< 21.4.0.0.0
FedoraprojectFedora38

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-1311?

CVE-2018-1311 is a vulnerability with a CVSS score of 8.1 (HIGH). The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library ...

How severe is CVE-2018-1311?

CVE-2018-1311 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-1311?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Xerces-C\+\+, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus, Redhat Enterprise Linux Server, Redhat Enterprise Linux Server Aus.