Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status
NVD contains:

Last updated: 9/1/2014 5:25:55 PM

CVE Publication rate: 13.23

Email List

NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists

Workload Index
Vulnerability Workload Index: 5.82
About Us
NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Cyber Awareness System

Vulnerability Summary for CVE-2009-3720

Original release date: 11/03/2009
Last revised: 09/28/2011
Source: US-CERT/NIST

Overview

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score: 5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:N/I:N/A:P) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 10.0
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type: Allows disruption of service

Vendor Statements (disclaimer)

Official Statement from Red Hat (03/05/2010)
Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3720 The Red Hat Security Response Team has rated this issue as having moderate security impact in Python, a future update may address this flaw. If a system has PyXML installed, Python will use PyXML for expat-related functions and is then not vulnerable to the issue.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

External Source: MLIST
Name: [oss-security] 20090827 Re: Re: expat bug 1990430
External Source: MLIST
Name: [expat-bugs] 20090117 [ expat-Bugs-1990430 ] Parser crash with specially formatted UTF-8 sequences
External Source: MANDRIVA
Name: MDVSA-2009:215
External Source: MLIST
Name: [oss-security] 20091022 Regarding expat bug 1990430
External Source: MLIST
Name: [oss-security] 20090821 expat bug 1990430
External Source: SECUNIA
Name: 39478
External Source: CONFIRM
Name: http://svn.python.org/view?view=rev&revision=74429
External Source: UBUNTU
Name: USN-890-1
External Source: SUSE
Name: SUSE-SR:2010:014
External Source: SECUNIA
Name: 43300
External Source: FEDORA
Name: FEDORA-2010-17807
External Source: VUPEN
Name: ADV-2010-3061
External Source: MLIST
Name: [oss-security] 20091022 Re: Re: Regarding expat bug 1990430
External Source: OVAL
Name: oval:org.mitre.oval:def:12719
External Source: MLIST
Name: [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
External Source: VUPEN
Name: ADV-2010-1107
External Source: SUSE
Name: SUSE-SR:2009:018
External Source: FEDORA
Name: FEDORA-2010-17762
External Source: SLACKWARE
Name: SSA:2011-041-02
External Source: FEDORA
Name: FEDORA-2009-12737
External Source: VUPEN
Name: ADV-2010-0896
External Source: REDHAT
Name: RHSA-2011:0896
External Source: MANDRIVA
Name: MDVSA-2009:216
External Source: SECUNIA
Name: 38050
External Source: MLIST
Name: [oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
External Source: SECUNIA
Name: 38832
External Source: MANDRIVA
Name: MDVSA-2009:217
External Source: REDHAT
Name: RHSA-2010:0002
External Source: FEDORA
Name: FEDORA-2009-12753
External Source: MLIST
Name: [oss-security] 20090826 Re: Re: expat bug 1990430
External Source: SUNALERT
Name: 273630
External Source: MLIST
Name: [oss-security] 20090906 Re: Re: expat bug 1990430
External Source: FEDORA
Name: FEDORA-2010-17819
External Source: MLIST
Name: [oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
External Source: SECUNIA
Name: 38834
External Source: MANDRIVA
Name: MDVSA-2009:212
External Source: SECUNIA
Name: 42326
External Source: CONFIRM
Name: https://bugs.gentoo.org/show_bug.cgi?id=280615
External Source: OVAL
Name: oval:org.mitre.oval:def:7112
External Source: SECUNIA
Name: 38794
External Source: SUSE
Name: SUSE-SR:2010:013
External Source: SECTRACK
Name: 1023160
External Source: MISC
Name: http://sourceforge.net/tracker/index.php?func=detail&aid=1990430&group_id=10127&atid=110127
External Source: SECUNIA
Name: 42338
External Source: CONFIRM
Name: http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?r1=1.13&r2=1.15&view=patch
External Source: MLIST
Name: [oss-security] 20090826 Re: expat bug 1990430
External Source: VUPEN
Name: ADV-2011-0359
External Source: CONFIRM
Name: http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?view=log
External Source: SUSE
Name: SUSE-SR:2010:011
External Source: MLIST
Name: [oss-security] 20091028 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]
External Source: CONFIRM
Name: https://bugzilla.redhat.com/show_bug.cgi?id=531697
External Source: VUPEN
Name: ADV-2010-3035
External Source: MANDRIVA
Name: MDVSA-2009:211
External Source: MANDRIVA
Name: MDVSA-2009:219
External Source: SECUNIA
Name: 37537
External Source: MANDRIVA
Name: MDVSA-2009:220
External Source: SECUNIA
Name: 37324
External Source: VUPEN
Name: ADV-2010-3053
External Source: OVAL
Name: oval:org.mitre.oval:def:11019
External Source: UBUNTU
Name: USN-890-6
External Source: FEDORA
Name: FEDORA-2009-12690
External Source: VUPEN
Name: ADV-2010-0528
External Source: SECUNIA
Name: 37925
External Source: SECUNIA
Name: 41701
External Source: FEDORA
Name: FEDORA-2010-17732
External Source: FEDORA
Name: FEDORA-2010-17720
External Source: MANDRIVA
Name: MDVSA-2009:218
External Source: SECUNIA
Name: 38231
External Source: MLIST
Name: [oss-security] 20091022 Re: Regarding expat bug 1990430
External Source: SUSE
Name: SUSE-SR:2010:012

References to Check Content

Identifier: oval:org.mitre.oval:def:11019
Check System: http://oval.mitre.org/XMLSchema/oval-definitions-5
Identifier: oval:org.mitre.oval:def:12719
Check System: http://oval.mitre.org/XMLSchema/oval-definitions-5
Identifier: oval:org.mitre.oval:def:7112
Check System: http://oval.mitre.org/XMLSchema/oval-definitions-5

Technical Details

Vulnerability Type (View All)