The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs.
Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/apache/xerces-c/pull/54 | Exploit Patch Third Party Advisory | 
| https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r | Patch Vendor Advisory | 
| https://github.com/apache/xerces-c/pull/54 | Exploit Patch Third Party Advisory | 
| https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r | Mailing List Vendor Advisory | 
Configurations
                    History
                    16 Jan 2025, 17:51
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CPE | cpe:2.3:a:apache:xerces-c\+\+:*:*:*:*:*:*:*:* | |
| First Time | Apache xerces-c\+\+ Apache | |
| References | () https://github.com/apache/xerces-c/pull/54 - Exploit, Patch, Third Party Advisory | |
| References | () https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r - Mailing List, Vendor Advisory | 
21 Nov 2024, 08:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/apache/xerces-c/pull/54 - | |
| References | () https://lists.apache.org/thread/c497tgn864tsbm8w0bo3f0d81s07zk9r - | 
01 Aug 2024, 13:47
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.1 | 
29 Feb 2024, 01:44
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-29 01:44
Updated : 2025-01-16 17:51
NVD link : CVE-2024-23807
Mitre link : CVE-2024-23807
CVE.ORG link : CVE-2024-23807
JSON object : View
Products Affected
                apache
- xerces-c\+\+
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
