Vulnerability CVE-2009-3720: Information

Description

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

Severity: MEDIUM (5.0)

Published: Nov. 3, 2009
Modified: Feb. 22, 2024

References to Advisories, Solutions, and Tools

Hyperlink
Resource
[oss-security] 20090826 Re: Re: expat bug 1990430
  • Mailing List
https://bugs.gentoo.org/show_bug.cgi?id=280615
  • Third Party Advisory
[oss-security] 20090821 expat bug 1990430
  • Mailing List
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?r1=1.13&r2=1.15&view=patch
  • Exploit
[expat-bugs] 20090117 [ expat-Bugs-1990430 ] Parser crash with specially formatted UTF-8 sequences
  • Third Party Advisory
[oss-security] 20091022 Re: Re: Regarding expat bug 1990430
  • Mailing List
http://sourceforge.net/tracker/index.php?func=detail&aid=1990430&group_id=10127&atid=110127
  • Mailing List
  • Third Party Advisory
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?view=log
  • Mailing List
  • Third Party Advisory
[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
  • Mailing List
[oss-security] 20090827 Re: Re: expat bug 1990430
  • Mailing List
[oss-security] 20090906 Re: Re: expat bug 1990430
  • Mailing List
[oss-security] 20090826 Re: expat bug 1990430
  • Mailing List
http://svn.python.org/view?view=rev&revision=74429
  • Permissions Required
  • Third Party Advisory
[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
  • Mailing List
[oss-security] 20091022 Re: Regarding expat bug 1990430
  • Mailing List
[oss-security] 20091028 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
  • Mailing List
[oss-security] 20091022 Regarding expat bug 1990430
  • Mailing List
MDVSA-2009:211
  • Permissions Required
  • Third Party Advisory
MDVSA-2009:217
  • Broken Link
MDVSA-2009:218
  • Broken Link
MDVSA-2009:215
  • Broken Link
SUSE-SR:2009:018
  • Third Party Advisory
MDVSA-2009:212
  • Broken Link
MDVSA-2009:220
  • Broken Link
MDVSA-2009:216
  • Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=531697
  • Issue Tracking
FEDORA-2009-12737
  • Third Party Advisory
37324
  • Broken Link
MDVSA-2009:219
  • Broken Link
FEDORA-2009-12690
  • Third Party Advisory
37537
  • Broken Link
1023160
  • Third Party Advisory
  • VDB Entry
273630
  • Broken Link
FEDORA-2009-12753
  • Third Party Advisory
37925
  • Broken Link
USN-890-1
  • Third Party Advisory
38231
  • Broken Link
38834
  • Broken Link
ADV-2010-0528
  • Broken Link
38794
  • Broken Link
38832
  • Broken Link
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
  • Broken Link
USN-890-6
  • Third Party Advisory
39478
  • Broken Link
ADV-2010-0896
  • Broken Link
ADV-2010-1107
  • Broken Link
SUSE-SR:2010:011
  • Third Party Advisory
  • VDB Entry
SUSE-SR:2010:012
  • Third Party Advisory
  • VDB Entry
38050
  • Broken Link
RHSA-2010:0002
  • Broken Link
SUSE-SR:2010:013
  • Third Party Advisory
  • VDB Entry
SUSE-SR:2010:014
  • Third Party Advisory
  • VDB Entry
41701
  • Broken Link
ADV-2011-0359
  • Broken Link
43300
  • Broken Link
SSA:2011-041-02
  • Mailing List
  • Third Party Advisory
RHSA-2011:0896
  • Broken Link
FEDORA-2010-17720
  • Third Party Advisory
42326
  • Broken Link
FEDORA-2010-17762
  • Third Party Advisory
ADV-2010-3061
  • Broken Link
ADV-2010-3053
  • Broken Link
ADV-2010-3035
  • Broken Link
FEDORA-2010-17819
  • Third Party Advisory
42338
  • Broken Link
FEDORA-2010-17807
  • Third Party Advisory
FEDORA-2010-17732
  • Mailing List
  • Third Party Advisory
HPSBUX02645
  • Mailing List
  • Third Party Advisory
oval:org.mitre.oval:def:7112
  • Mailing List
  • Third Party Advisory
oval:org.mitre.oval:def:12719
  • Broken Link
oval:org.mitre.oval:def:11019
  • Broken Link
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
  • Third Party Advisory
[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:libexpat_project:libexpat:2.0.1:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:a:a_m_kuchling:pyxml:*:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

      Configuration 2

      cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
      Start including
      2.0.35
      End excliding
      2.0.64

      cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
      Start including
      2.2.0
      End excliding
      2.2.17