First published: Thu Nov 05 2009(Updated: )
Expat is vulnerable to a denial of service, caused by the improper handling of XML data by the big2_toUtf8 function within the libexpat library. A remote attacker could exploit this vulnerability using a specially-crafted XML document containing malformed UTF-8 sequences that trigger a buffer over-read to cause the application to crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <0:1.95.7-4.el4_8.2 | 0:1.95.7-4.el4_8.2 |
redhat/expat | <0:1.95.8-8.3.el5_4.2 | 0:1.95.8-8.3.el5_4.2 |
redhat/expat | <2.1.0 | 2.1.0 |
Expat | =2.0.1 | |
XML-Twig for Perl | ||
IBM Engineering Requirements Management DOORS | <=9.7.2.8 | |
IBM Engineering Requirements Management DOORS Web Access | <=9.7.2.8 | |
IBM Rational DOORS | <=9.6.1.x | |
Debian (libexpat1) | =2.0.1 | |
Apache Http Server | >=2.0.35<2.0.64 | |
Apache Http Server | >=2.2.0<2.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2009-3560 has a severity rating that indicates it can lead to denial of service due to improper XML data handling.
To fix CVE-2009-3560, update to the latest version of the affected software, ensuring it is above the specified vulnerable versions.
CVE-2009-3560 affects older versions of the Expat library, specific versions of IBM DOORS, and certain versions of Apache HTTP Server.
Yes, CVE-2009-3560 can be exploited remotely using specially crafted XML documents.
CVE-2009-3560 can facilitate denial of service attacks by triggering buffer overflows through malformed UTF-8 sequences.