CVE Vulnerabilities

CVE-2018-1311

Use After Free

Published: Dec 18, 2019 | Modified: Nov 21, 2024
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Xerces-c++ Apache 3.0.0 (including) 3.2.5 (excluding)
Red Hat Enterprise Linux 6 RedHat xerces-c-0:3.0.1-21.el6_10 *
Red Hat Enterprise Linux 7 RedHat xerces-c-0:3.1.1-10.el7_7 *
Xerces-c Ubuntu bionic *
Xerces-c Ubuntu disco *
Xerces-c Ubuntu eoan *
Xerces-c Ubuntu esm-apps/bionic *
Xerces-c Ubuntu esm-apps/focal *
Xerces-c Ubuntu esm-apps/jammy *
Xerces-c Ubuntu esm-apps/xenial *
Xerces-c Ubuntu esm-infra-legacy/trusty *
Xerces-c Ubuntu focal *
Xerces-c Ubuntu groovy *
Xerces-c Ubuntu hirsute *
Xerces-c Ubuntu impish *
Xerces-c Ubuntu jammy *
Xerces-c Ubuntu kinetic *
Xerces-c Ubuntu lunar *
Xerces-c Ubuntu mantic *
Xerces-c Ubuntu trusty *
Xerces-c Ubuntu trusty/esm *
Xerces-c Ubuntu upstream *
Xerces-c Ubuntu xenial *

Potential Mitigations

References