On Sun, Dec 13, 2009 at 9:20 AM, Michael Gilbert <michael.s.gilb...@gmail.com> wrote: > CVE-2009-3560[0]: > | The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, > | as used in the XML-Twig module for Perl, allows context-dependent > | attackers to cause a denial of service (application crash) via an XML > | document with malformed UTF-8 sequences that trigger a buffer > | over-read, related to the doProlog function in lib/xmlparse.c, a > | different vulnerability than CVE-2009-2625 and CVE-2009-3720.
The current implementation in ayttm simply abort()s on invalid xml, so it is a DoS, but not a buffer over-read. I'll remove the abort and return an error instead. > CVE-2009-3720[1]: > | The updatePosition function in lib/xmltok_impl.c in libexpat in Expat > | 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, > | allows context-dependent attackers to cause a denial of service > | (application crash) via an XML document with crafted UTF-8 sequences > | that trigger a buffer over-read, a different vulnerability than > | CVE-2009-2625. The fix from upstream applies (more or less) directly here. -- Siddhesh Poyarekar http://siddhesh.in -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org