FreeBSD : expat2 -- Parser crash with specially formatted UTF-8 sequences (5f030587-e39a-11de-881e-001aa0166822)

medium Nessus Plugin ID 43037

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

CVE reports :

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?19dfa5d4

Plugin Details

Severity: Medium

ID: 43037

File Name: freebsd_pkg_5f030587e39a11de881e001aa0166822.nasl

Version: 1.10

Type: local

Published: 12/8/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:expat2, p-cpe:/a:freebsd:freebsd:linux-f10-expat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/8/2009

Vulnerability Publication Date: 1/17/2009

Reference Information

CVE: CVE-2009-3720