National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-3720 Detail

Description

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

Source:  MITRE      Last Modified:  11/03/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-3720
Original release date:
11/03/2009
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (03/05/2010)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3720 The Red Hat Security Response Team has rated this issue as having moderate security impact in Python, a future update may address this flaw. If a system has PyXML installed, Python will use PyXML for expat-related functions and is then not vulnerable to the issue.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?r1=1.13&r2=1.15&view=patch Exploit External Source CONFIRM http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?r1=1.13&r2=1.15&view=patch
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?view=log External Source CONFIRM http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?view=log
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051228.html External Source FEDORA FEDORA-2010-17762
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051247.html External Source FEDORA FEDORA-2010-17732
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051367.html External Source FEDORA FEDORA-2010-17720
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051405.html External Source FEDORA FEDORA-2010-17819
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051442.html External Source FEDORA FEDORA-2010-17807
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html External Source SUSE SUSE-SR:2009:018
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html External Source SUSE SUSE-SR:2010:011
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html External Source SUSE SUSE-SR:2010:012
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html External Source SUSE SUSE-SR:2010:013
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html External Source SUSE SUSE-SR:2010:014
http://lists.vmware.com/pipermail/security-announce/2010/000082.html External Source MLIST [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
http://mail.python.org/pipermail/expat-bugs/2009-January/002781.html External Source MLIST [expat-bugs] 20090117 [ expat-Bugs-1990430 ] Parser crash with specially formatted UTF-8 sequences
http://marc.info/?l=bugtraq&m=130168502603566&w=2 External Source HP HPSBUX02645
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026 External Source SLACKWARE SSA:2011-041-02
http://sourceforge.net/tracker/index.php?func=detail&aid=1990430&group_id=10127&atid=110127 External Source MISC http://sourceforge.net/tracker/index.php?func=detail&aid=1990430&group_id=10127&atid=110127
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1 External Source SUNALERT 273630
http://svn.python.org/view?view=rev&revision=74429 External Source CONFIRM http://svn.python.org/view?view=rev&revision=74429
http://www.mandriva.com/security/advisories?name=MDVSA-2009:211 External Source MANDRIVA MDVSA-2009:211
http://www.mandriva.com/security/advisories?name=MDVSA-2009:212 External Source MANDRIVA MDVSA-2009:212
http://www.mandriva.com/security/advisories?name=MDVSA-2009:215 External Source MANDRIVA MDVSA-2009:215
http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 External Source MANDRIVA MDVSA-2009:216
http://www.mandriva.com/security/advisories?name=MDVSA-2009:217 External Source MANDRIVA MDVSA-2009:217
http://www.mandriva.com/security/advisories?name=MDVSA-2009:218 External Source MANDRIVA MDVSA-2009:218
http://www.mandriva.com/security/advisories?name=MDVSA-2009:219 External Source MANDRIVA MDVSA-2009:219
http://www.mandriva.com/security/advisories?name=MDVSA-2009:220 External Source MANDRIVA MDVSA-2009:220
http://www.openwall.com/lists/oss-security/2009/08/21/2 External Source MLIST [oss-security] 20090821 expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/08/26/3 External Source MLIST [oss-security] 20090826 Re: expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/08/26/4 External Source MLIST [oss-security] 20090826 Re: Re: expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/08/27/6 External Source MLIST [oss-security] 20090827 Re: Re: expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/09/06/1 External Source MLIST [oss-security] 20090906 Re: Re: expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/10/22/5 External Source MLIST [oss-security] 20091022 Regarding expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/10/22/9 External Source MLIST [oss-security] 20091022 Re: Regarding expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/10/23/2 External Source MLIST [oss-security] 20091022 Re: Re: Regarding expat bug 1990430
http://www.openwall.com/lists/oss-security/2009/10/23/6 External Source MLIST [oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
http://www.openwall.com/lists/oss-security/2009/10/26/3 External Source MLIST [oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
http://www.openwall.com/lists/oss-security/2009/10/28/3 External Source MLIST [oss-security] 20091028 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
http://www.redhat.com/support/errata/RHSA-2010-0002.html External Source REDHAT RHSA-2010:0002
http://www.redhat.com/support/errata/RHSA-2011-0896.html External Source REDHAT RHSA-2011:0896
http://www.securitytracker.com/id?1023160 External Source SECTRACK 1023160
http://www.ubuntu.com/usn/USN-890-1 External Source UBUNTU USN-890-1
http://www.ubuntu.com/usn/USN-890-6 External Source UBUNTU USN-890-6
http://www.vupen.com/english/advisories/2010/0528 External Source VUPEN ADV-2010-0528
http://www.vupen.com/english/advisories/2010/0896 External Source VUPEN ADV-2010-0896
http://www.vupen.com/english/advisories/2010/1107 External Source VUPEN ADV-2010-1107
http://www.vupen.com/english/advisories/2010/3035 External Source VUPEN ADV-2010-3035
http://www.vupen.com/english/advisories/2010/3053 External Source VUPEN ADV-2010-3053
http://www.vupen.com/english/advisories/2010/3061 External Source VUPEN ADV-2010-3061
http://www.vupen.com/english/advisories/2011/0359 External Source VUPEN ADV-2011-0359
https://bugs.gentoo.org/show_bug.cgi?id=280615 External Source CONFIRM https://bugs.gentoo.org/show_bug.cgi?id=280615
https://bugzilla.redhat.com/show_bug.cgi?id=531697 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=531697
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11019 External Source OVAL oval:org.mitre.oval:def:11019
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12719 External Source OVAL oval:org.mitre.oval:def:12719
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7112 External Source OVAL oval:org.mitre.oval:def:7112
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html External Source FEDORA FEDORA-2009-12690
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html External Source FEDORA FEDORA-2009-12737
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01274.html External Source FEDORA FEDORA-2009-12753

References to Check Content

Identifier:
oval:org.mitre.oval:def:11019
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11019
Identifier:
oval:org.mitre.oval:def:12719
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:12719
Identifier:
oval:org.mitre.oval:def:7112
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:7112

Technical Details

Vulnerability Type (View All)

Change History 3 change records found - show changes