Description
The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2498-1 | xerces-c security update |
Debian DLA |
DLA-3704-1 | xerces-c security update |
Debian DSA |
DSA-4814-1 | xerces-c security update |
Ubuntu USN |
USN-6579-1 | Xerces-C++ vulnerability |
Ubuntu USN |
USN-6579-2 | Xerces-C++ vulnerability |
Ubuntu USN |
USN-6590-1 | Xerces-C++ vulnerabilities |
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Apache
Subscribe
Xerces-c\+\+
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Oracle
Subscribe
Goldengate
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-04T18:14:14.531Z
Reserved: 2017-12-07T00:00:00.000Z
Link: CVE-2018-1311
No data.
Status : Modified
Published: 2019-12-18T20:15:15.493
Modified: 2025-11-04T19:15:38.763
Link: CVE-2018-1311
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN