Vulnerability Description
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libexpat Project | Libexpat | 2.0.1 |
| Xmltwig | Xml-Twig For Perl | All versions |
| Apache | Http Server | >= 2.0.35, < 2.0.64 |
Related Weaknesses (CWE)
References
- http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1Permissions Required
- http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1Broken Link
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.htmlThird Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.htmlThird Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.htmlThird Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.htmlThird Party AdvisoryVDB Entry
- http://lists.vmware.com/pipermail/security-announce/2010/000082.htmlBroken Link
- http://mail.python.org/pipermail/expat-bugs/2009-November/002846.htmlExploit
- http://marc.info/?l=bugtraq&m=130168502603566&w=2Mailing ListThird Party Advisory
- http://secunia.com/advisories/37537Broken Link
- http://secunia.com/advisories/38231Broken Link
- http://secunia.com/advisories/38794Broken Link
- http://secunia.com/advisories/38832Broken Link
- http://secunia.com/advisories/38834Broken Link
FAQ
What is CVE-2009-3560?
CVE-2009-3560 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an...
How severe is CVE-2009-3560?
CVE-2009-3560 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-3560?
Check the references section above for vendor advisories and patch information. Affected products include: Libexpat Project Libexpat, Xmltwig Xml-Twig For Perl, Apache Http Server.