Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3720

Опубликовано: 17 янв. 2009
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xmlrpc-cNot affected
Red Hat Enterprise Linux 6compat-expat1Not affected
Red Hat Enterprise Linux 6expatNot affected
Red Hat Enterprise Linux 6pythonNot affected
Red Hat Enterprise Linux 6PyXMLNot affected
Red Hat Enterprise Linux 7expatNot affected
Red Hat Enterprise Linux 34SuiteFixedRHSA-2009:157210.11.2009
Red Hat Enterprise Linux 3expatFixedRHSA-2009:162507.12.2009
Red Hat Enterprise Linux 44SuiteFixedRHSA-2009:157210.11.2009
Red Hat Enterprise Linux 4expatFixedRHSA-2009:162507.12.2009

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=531697expat: buffer over-read and crash on XML with malformed UTF-8 sequences

EPSS

Процентиль: 72%
0.00762
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

nvd
больше 15 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

debian
больше 15 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat ...

github
около 3 лет назад

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

oracle-oval
больше 15 лет назад

ELSA-2010-0002: PyXML security update (MODERATE)

EPSS

Процентиль: 72%
0.00762
Низкий

5 Medium

CVSS2