{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2016-4463", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "n/a", "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "MISC", "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html", "refsource": "MISC", "name": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" }, { "url": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html", "refsource": "MISC", "name": "http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html" }, { "url": "http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html", "refsource": "MISC", "name": "http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html" }, { "url": "http://www.securityfocus.com/archive/1/538784/100/0/threaded", "refsource": "MISC", "name": "http://www.securityfocus.com/archive/1/538784/100/0/threaded" }, { "url": "http://www.securityfocus.com/bid/91501", "refsource": "MISC", "name": "http://www.securityfocus.com/bid/91501" }, { "url": "http://www.securitytracker.com/id/1036211", "refsource": "MISC", "name": "http://www.securitytracker.com/id/1036211" }, { "url": "http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt", "refsource": "MISC", "name": "http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt" }, { "url": "https://access.redhat.com/errata/RHSA-2018:3335", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3335" }, { "url": "https://access.redhat.com/errata/RHSA-2018:3506", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3506" }, { "url": "https://access.redhat.com/errata/RHSA-2018:3514", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2018:3514" }, { "url": "https://issues.apache.org/jira/browse/XERCESC-2069", "refsource": "MISC", "name": "https://issues.apache.org/jira/browse/XERCESC-2069" }, { "url": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069", "refsource": "MISC", "name": "https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069" }, { "url": "https://www.debian.org/security/2016/dsa-3610", "refsource": "MISC", "name": "https://www.debian.org/security/2016/dsa-3610" } ] } }