// For flags

CVE-2009-3720

expat: buffer over-read and crash on XML with malformed UTF-8 sequences

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.

La función updatePosition en lib/xmltok_impl.c en libexpat en Expat v2.0.1, usado en Python, PyXML, w3c-libwww, ay otros programas, permite a atacantes dependientes de contexto, provocar una denegación de servicio (caída de aplicación) a través de un documento XML con una secuencia de caracteres UTF-8 manipulada que provoca un desbordamiento de búfer fuera de límite (over-read). Vulnerabilidad distinta de CVE-2009-2625.

This advisory provides additional information for APPLE-SA-2017-03-22-1. iTunes for Windows 12.6 addresses multiple vulnerabilities in various included software.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-10-16 CVE Reserved
  • 2009-11-03 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2025-04-03 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (92)
URL Tag Source
http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmltok_impl.c?view=log Mailing List
http://lists.vmware.com/pipermail/security-announce/2010/000082.html Broken Link
http://mail.python.org/pipermail/expat-bugs/2009-January/002781.html Mailing List
http://secunia.com/advisories/37324 Broken Link
http://secunia.com/advisories/37537 Broken Link
http://secunia.com/advisories/37925 Broken Link
http://secunia.com/advisories/38050 Broken Link
http://secunia.com/advisories/38231 Broken Link
http://secunia.com/advisories/38794 Broken Link
http://secunia.com/advisories/38832 Broken Link
http://secunia.com/advisories/38834 Broken Link
http://secunia.com/advisories/39478 Broken Link
http://secunia.com/advisories/41701 Broken Link
http://secunia.com/advisories/42326 Broken Link
http://secunia.com/advisories/42338 Broken Link
http://secunia.com/advisories/43300 Broken Link
http://sourceforge.net/tracker/index.php?func=detail&aid=1990430&group_id=10127&atid=110127 Mailing List
http://www.openwall.com/lists/oss-security/2009/08/21/2 Mailing List
http://www.openwall.com/lists/oss-security/2009/08/26/3 Mailing List
http://www.openwall.com/lists/oss-security/2009/08/26/4 Mailing List
http://www.openwall.com/lists/oss-security/2009/08/27/6 Mailing List
http://www.openwall.com/lists/oss-security/2009/09/06/1 Mailing List
http://www.openwall.com/lists/oss-security/2009/10/22/5 Mailing List
http://www.openwall.com/lists/oss-security/2009/10/22/9 Mailing List
http://www.openwall.com/lists/oss-security/2009/10/23/2 Mailing List
http://www.openwall.com/lists/oss-security/2009/10/23/6 Mailing List
http://www.openwall.com/lists/oss-security/2009/10/26/3 Mailing List
http://www.openwall.com/lists/oss-security/2009/10/28/3 Mailing List
http://www.securitytracker.com/id?1023160 Third Party Advisory
http://www.vupen.com/english/advisories/2010/0528 Broken Link
http://www.vupen.com/english/advisories/2010/0896 Broken Link
http://www.vupen.com/english/advisories/2010/1107 Broken Link
http://www.vupen.com/english/advisories/2010/3035 Broken Link
http://www.vupen.com/english/advisories/2010/3053 Broken Link
http://www.vupen.com/english/advisories/2010/3061 Broken Link
http://www.vupen.com/english/advisories/2011/0359 Broken Link
https://bugs.gentoo.org/show_bug.cgi?id=280615 Third Party Advisory
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11019 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12719 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7112 Mailing List
URL Date SRC
URL Date SRC
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051228.html 2024-02-22
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051247.html 2024-02-22
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051367.html 2024-02-22
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051405.html 2024-02-22
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051442.html 2024-02-22
http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html 2024-02-22
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html 2024-02-22
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html 2024-02-22
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html 2024-02-22
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html 2024-02-22
http://marc.info/?l=bugtraq&m=130168502603566&w=2 2024-02-22
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026 2024-02-22
http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:212 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:215 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:216 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:217 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:218 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:219 2024-02-22
http://www.mandriva.com/security/advisories?name=MDVSA-2009:220 2024-02-22
http://www.redhat.com/support/errata/RHSA-2010-0002.html 2024-02-22
http://www.redhat.com/support/errata/RHSA-2011-0896.html 2024-02-22
http://www.ubuntu.com/usn/USN-890-1 2024-02-22
http://www.ubuntu.com/usn/USN-890-6 2024-02-22
https://bugzilla.redhat.com/show_bug.cgi?id=531697 2017-11-16
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html 2024-02-22
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html 2024-02-22
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01274.html 2024-02-22
https://access.redhat.com/security/cve/CVE-2009-3720 2017-11-16
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Libexpat Project
Search vendor "Libexpat Project"
Libexpat
Search vendor "Libexpat Project" for product "Libexpat"
2.0.1
Search vendor "Libexpat Project" for product "Libexpat" and version "2.0.1"
-
Affected
in A M Kuchling
Search vendor "A M Kuchling"
Pyxml
Search vendor "A M Kuchling" for product "Pyxml"
*-
Safe
Libexpat Project
Search vendor "Libexpat Project"
Libexpat
Search vendor "Libexpat Project" for product "Libexpat"
2.0.1
Search vendor "Libexpat Project" for product "Libexpat" and version "2.0.1"
-
Affected
in Python
Search vendor "Python"
Python
Search vendor "Python" for product "Python"
*-
Safe
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.0.35 < 2.0.64
Search vendor "Apache" for product "Http Server" and version " >= 2.0.35 < 2.0.64"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.2.0 < 2.2.17
Search vendor "Apache" for product "Http Server" and version " >= 2.2.0 < 2.2.17"
-
Affected