On Sun, 13 Dec 2009 11:06:13 +0530 Siddhesh Poyarekar wrote:

> On Sun, Dec 13, 2009 at 9:20 AM, Michael Gilbert
> <michael.s.gilb...@gmail.com> wrote:
> > CVE-2009-3560[0]:
> > | The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1,
> > | as used in the XML-Twig module for Perl, allows context-dependent
> > | attackers to cause a denial of service (application crash) via an XML
> > | document with malformed UTF-8 sequences that trigger a buffer
> > | over-read, related to the doProlog function in lib/xmlparse.c, a
> > | different vulnerability than CVE-2009-2625 and CVE-2009-3720.
> 
> The current implementation in ayttm simply abort()s on invalid xml, so
> it is a DoS, but not a buffer over-read. I'll remove the abort and
> return an error instead.

The optimal solution is to make use of the system expat in case of
future issues.

Mike



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to