You are viewing a plain text version of this content. The canonical link for it is here.
Posted to c-dev@xerces.apache.org by "Moti (JIRA)" <xe...@xml.apache.org> on 2016/11/19 19:23:58 UTC

[jira] [Commented] (XERCESC-2061) Buffer overruns in prolog parsing and error handling

    [ https://issues.apache.org/jira/browse/XERCESC-2061?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15679732#comment-15679732 ] 

Moti commented on XERCESC-2061:
-------------------------------

Hi Scott,
You specified that the affected version is 3.1.2.
However, the NVD says (https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0729) that all the versions before 3.1.3 are vulnerable to this (CVE-2016-0729) security issue.
I wanted to ask specifically for v2.7 whether it's vulnerable to it or not.

Can you put some light here?
Thanks!

> Buffer overruns in prolog parsing and error handling
> ----------------------------------------------------
>
>                 Key: XERCESC-2061
>                 URL: https://issues.apache.org/jira/browse/XERCESC-2061
>             Project: Xerces-C++
>          Issue Type: Bug
>          Components: Non-Validating Parser, Validating Parser (DTD), Validating Parser (XML Schema)
>    Affects Versions: 3.1.2
>            Reporter: Scott Cantor
>            Priority: Blocker
>             Fix For: 3.2.0, 3.1.3
>
>
> Vulnerabilities were reported to the project that led to the discovery of several buffer overflows.
> The issue was publically disclosed as CVE-2016-0729



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: c-dev-unsubscribe@xerces.apache.org
For additional commands, e-mail: c-dev-help@xerces.apache.org