High severity7.5NVD Advisory· Published Jul 8, 2016· Updated May 6, 2026
CVE-2016-4463
CVE-2016-4463
Description
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- lists.opensuse.org/opensuse-updates/2016-07/msg00053.htmlnvd
- lists.opensuse.org/opensuse-updates/2016-09/msg00013.htmlnvd
- packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.htmlnvd
- www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlnvd
- www.securityfocus.com/archive/1/538784/100/0/threadednvd
- www.securityfocus.com/bid/91501nvd
- www.securitytracker.com/id/1036211nvd
- xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txtnvd
- access.redhat.com/errata/RHSA-2018:3335nvd
- access.redhat.com/errata/RHSA-2018:3506nvd
- access.redhat.com/errata/RHSA-2018:3514nvd
- issues.apache.org/jira/browse/XERCESC-2069nvd
- issues.apache.org/jira/secure/ReleaseNote.jspanvd
- www.debian.org/security/2016/dsa-3610nvd
- www.oracle.com/security-alerts/cpuapr2020.htmlnvd
News mentions
0No linked articles in our index yet.