FreeBSD : expat2 -- Parser crash with specially formatted UTF-8 sequences (5f030587-e39a-11de-881e-001aa0166822)

Medium Nessus Plugin ID 43037


The remote FreeBSD host is missing one or more security-related updates.


CVE reports :

The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 43037

File Name: freebsd_pkg_5f030587e39a11de881e001aa0166822.nasl

Version: $Revision: 1.7 $

Type: local

Published: 2009/12/08

Modified: 2014/04/16

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:expat2, p-cpe:/a:freebsd:freebsd:linux-f10-expat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2009/12/08

Vulnerability Publication Date: 2009/01/17

Reference Information

CVE: CVE-2009-3720