Source: xerces-c2 Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xerces-c2.
CVE-2008-4482[0]: | The XML parser in Xerces-C++ before 3.0.0 allows context-dependent | attackers to cause a denial of service (stack consumption and crash) | via an XML schema definition with a large maxOccurs value, which | triggers excessive memory consumption during validation of an XML | file. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4482 http://security-tracker.debian.net/tracker/CVE-2008-4482 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpyPfaNndJv5.pgp
Description: PGP signature