exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2009-316

Mandriva Linux Security Advisory 2009-316
Posted Dec 7, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-316 - The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than and CVE-2009-3720. Packages for 2008.0 are being provided due to extended support for Corporate products. This update provides a solution to these vulnerabilities.

tags | advisory, denial of service, perl, vulnerability
systems | linux, mandriva
advisories | CVE-2009-3560
SHA-256 | a4f5212089e79d79b8222da5bb00dc203143f370dfbbdd0a9dbdc6d9d55599db

Mandriva Linux Security Advisory 2009-316

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:316
http://www.mandriva.com/security/
_______________________________________________________________________

Package : expat
Date : December 5, 2009
Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 3.0, Corporate 4.0,
Enterprise Server 5.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in expat:

The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1,
as used in the XML-Twig module for Perl, allows context-dependent
attackers to cause a denial of service (application crash) via an
XML document with malformed UTF-8 sequences that trigger a buffer
over-read, related to the doProlog function in lib/xmlparse.c,
a different vulnerability than CVE-2009-2625 and CVE-2009-3720
(CVE-2009-3560).

Packages for 2008.0 are being provided due to extended support for
Corporate products.

This update provides a solution to these vulnerabilities.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
9108b905fb1da6ed2fa0f83a0c386641 2008.0/i586/expat-2.0.1-4.2mdv2008.0.i586.rpm
f204a06346e382581b0d3f3301ffadd3 2008.0/i586/libexpat1-2.0.1-4.2mdv2008.0.i586.rpm
ab9269a6452f0191d17b88a7cae90949 2008.0/i586/libexpat1-devel-2.0.1-4.2mdv2008.0.i586.rpm
6363348acd6f5f6f0fa5c4aa61a6ebbd 2008.0/SRPMS/expat-2.0.1-4.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
03e2988fe55ecd7c7888cdb87ca9e779 2008.0/x86_64/expat-2.0.1-4.2mdv2008.0.x86_64.rpm
8322f60c8e9ac7f21243b220951d52ec 2008.0/x86_64/lib64expat1-2.0.1-4.2mdv2008.0.x86_64.rpm
7433c14fc17e7c5eaf177c002cc1d75c 2008.0/x86_64/lib64expat1-devel-2.0.1-4.2mdv2008.0.x86_64.rpm
6363348acd6f5f6f0fa5c4aa61a6ebbd 2008.0/SRPMS/expat-2.0.1-4.2mdv2008.0.src.rpm

Mandriva Linux 2009.0:
a3406f038312e930bcf6e37591cf872a 2009.0/i586/expat-2.0.1-7.2mdv2009.0.i586.rpm
15a6e0faa82f77c0a29b9db9abbb8930 2009.0/i586/libexpat1-2.0.1-7.2mdv2009.0.i586.rpm
7d6e768b90064aed25977f3fa66a86a8 2009.0/i586/libexpat1-devel-2.0.1-7.2mdv2009.0.i586.rpm
778a521e0fe9de8444aebbea544aaceb 2009.0/SRPMS/expat-2.0.1-7.2mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
7cffc848d7c1018ef8cf2f6ead9c56c7 2009.0/x86_64/expat-2.0.1-7.2mdv2009.0.x86_64.rpm
314b0c2ee406f43fa2d48edccb40465d 2009.0/x86_64/lib64expat1-2.0.1-7.2mdv2009.0.x86_64.rpm
eeda32bc03d649fe1c1975433532c78d 2009.0/x86_64/lib64expat1-devel-2.0.1-7.2mdv2009.0.x86_64.rpm
778a521e0fe9de8444aebbea544aaceb 2009.0/SRPMS/expat-2.0.1-7.2mdv2009.0.src.rpm

Mandriva Linux 2009.1:
1700ce9cfb27620758d354d996433e76 2009.1/i586/expat-2.0.1-8.2mdv2009.1.i586.rpm
517a6e6356a1fc05cea9a7a473ccfd61 2009.1/i586/libexpat1-2.0.1-8.2mdv2009.1.i586.rpm
38d04bf472e9d4008fb636149d25fbeb 2009.1/i586/libexpat1-devel-2.0.1-8.2mdv2009.1.i586.rpm
3e6ab6cdb43fff3547b4f24aab4ec82b 2009.1/SRPMS/expat-2.0.1-8.2mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
0c0b11d85cac8a9f3da701e452acb6ad 2009.1/x86_64/expat-2.0.1-8.2mdv2009.1.x86_64.rpm
ac3512d4f42111bbee9987c5c93c7005 2009.1/x86_64/lib64expat1-2.0.1-8.2mdv2009.1.x86_64.rpm
fd409ba4722686326c9fe1d9db3ead42 2009.1/x86_64/lib64expat1-devel-2.0.1-8.2mdv2009.1.x86_64.rpm
3e6ab6cdb43fff3547b4f24aab4ec82b 2009.1/SRPMS/expat-2.0.1-8.2mdv2009.1.src.rpm

Mandriva Linux 2010.0:
d9a3e00019a7a0486f22988ba923b22f 2010.0/i586/expat-2.0.1-10.1mdv2010.0.i586.rpm
bdcf6e26502cde43c8239de13841afb2 2010.0/i586/libexpat1-2.0.1-10.1mdv2010.0.i586.rpm
cd58e1d189212d7b54dc1fda48aa915c 2010.0/i586/libexpat1-devel-2.0.1-10.1mdv2010.0.i586.rpm
c7a0caabeee91810964149052325fc41 2010.0/SRPMS/expat-2.0.1-10.1mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
520af61cc436ac5fcef44464e41467e8 2010.0/x86_64/expat-2.0.1-10.1mdv2010.0.x86_64.rpm
42198ace124689b5303611d03974d2a3 2010.0/x86_64/lib64expat1-2.0.1-10.1mdv2010.0.x86_64.rpm
42bb51a93dfd026f91c7c4181f53988b 2010.0/x86_64/lib64expat1-devel-2.0.1-10.1mdv2010.0.x86_64.rpm
c7a0caabeee91810964149052325fc41 2010.0/SRPMS/expat-2.0.1-10.1mdv2010.0.src.rpm

Corporate 3.0:
b6aaa4059149ce789b85618334255c76 corporate/3.0/i586/expat-1.95.6-4.2.C30mdk.i586.rpm
f4a9f6fb4d3e53446ef059fbe3b93bdd corporate/3.0/i586/libexpat0-1.95.6-4.2.C30mdk.i586.rpm
b9d823b63878bb690dc9fddac1ca2a61 corporate/3.0/i586/libexpat0-devel-1.95.6-4.2.C30mdk.i586.rpm
43e083dc87a85e530d7f8206102e1eac corporate/3.0/SRPMS/expat-1.95.6-4.2.C30mdk.src.rpm

Corporate 3.0/X86_64:
44e65c80d7feb44d67c2e8a168595f66 corporate/3.0/x86_64/expat-1.95.6-4.2.C30mdk.x86_64.rpm
de22ad66c1d6b83a6c5310dd3e179927 corporate/3.0/x86_64/lib64expat0-1.95.6-4.2.C30mdk.x86_64.rpm
da53e544b02e14ed23096ce9a71353b9 corporate/3.0/x86_64/lib64expat0-devel-1.95.6-4.2.C30mdk.x86_64.rpm
43e083dc87a85e530d7f8206102e1eac corporate/3.0/SRPMS/expat-1.95.6-4.2.C30mdk.src.rpm

Corporate 4.0:
a49316221d42e4a2cfe15b1788474e7b corporate/4.0/i586/expat-1.95.8-1.2.20060mlcs4.i586.rpm
9e83fb9d0ca5799399ca5f10e92fb4cd corporate/4.0/i586/libexpat0-1.95.8-1.2.20060mlcs4.i586.rpm
3d1a006b0039c30babe0407db5f26ee2 corporate/4.0/i586/libexpat0-devel-1.95.8-1.2.20060mlcs4.i586.rpm
2695cdbc0f4c8af7c8d6b89cf28675f8 corporate/4.0/SRPMS/expat-1.95.8-1.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
df66dc609fb70e7022c6c5aa8dcce5c9 corporate/4.0/x86_64/expat-1.95.8-1.2.20060mlcs4.x86_64.rpm
e9b731d1ef96d3f4cd7390596a97cd3a corporate/4.0/x86_64/lib64expat0-1.95.8-1.2.20060mlcs4.x86_64.rpm
5e1a4cedad5e8d32eb1deabbbd6fa231 corporate/4.0/x86_64/lib64expat0-devel-1.95.8-1.2.20060mlcs4.x86_64.rpm
2695cdbc0f4c8af7c8d6b89cf28675f8 corporate/4.0/SRPMS/expat-1.95.8-1.2.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
4c7a80c4e63028d9c22feec7ea39863a mes5/i586/expat-2.0.1-7.2mdvmes5.i586.rpm
e3f6943d2fdc244cc6c320cef17398fe mes5/i586/libexpat1-2.0.1-7.2mdvmes5.i586.rpm
9e049d963fd965626bf9423ef115b693 mes5/i586/libexpat1-devel-2.0.1-7.2mdvmes5.i586.rpm
7787fe800e5725bce292f823d0c8ab73 mes5/SRPMS/expat-2.0.1-7.2mdvmes5.src.rpm

Mandriva Enterprise Server 5/X86_64:
236584ced4908443a73c28912e01c643 mes5/x86_64/expat-2.0.1-7.2mdvmes5.x86_64.rpm
1e7646bc5048a8718d60a028a8d30fe2 mes5/x86_64/lib64expat1-2.0.1-7.2mdvmes5.x86_64.rpm
5b866d88e7846ab08b43858a84257b70 mes5/x86_64/lib64expat1-devel-2.0.1-7.2mdvmes5.x86_64.rpm
7787fe800e5725bce292f823d0c8ab73 mes5/SRPMS/expat-2.0.1-7.2mdvmes5.src.rpm

Multi Network Firewall 2.0:
f8db54d55d92f95a176440a7a6978dae mnf/2.0/i586/expat-1.95.6-4.2.C30mdk.i586.rpm
c83ec9ece46500bcc652fb0a8c574fcf mnf/2.0/i586/libexpat0-1.95.6-4.2.C30mdk.i586.rpm
02a342d1777e7bc726a3e294050a3c20 mnf/2.0/i586/libexpat0-devel-1.95.6-4.2.C30mdk.i586.rpm
4ec71f97401c195d2401225eac653560 mnf/2.0/SRPMS/expat-1.95.6-4.2.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLGktEmqjQ0CJFipgRArfUAKDUGfL7722MRKbLGCcBOvvAj8frfQCgxfyF
iTjKX+OouJ0dDURPsS6vJ24=
=NJfZ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close