CVE-2009-2416

Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
References
Link Resource
http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html Release Notes
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html Mailing List
http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html Mailing List
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html Mailing List
http://secunia.com/advisories/35036 Broken Link
http://secunia.com/advisories/36207 Broken Link
http://secunia.com/advisories/36338 Broken Link
http://secunia.com/advisories/36417 Broken Link
http://secunia.com/advisories/36631 Broken Link
http://secunia.com/advisories/37346 Broken Link
http://secunia.com/advisories/37471 Broken Link
http://support.apple.com/kb/HT3937 Third Party Advisory
http://support.apple.com/kb/HT3949 Third Party Advisory
http://support.apple.com/kb/HT4225 Third Party Advisory
http://www.cert.fi/en/reports/2009/vulnerability2009085.html Broken Link
http://www.codenomicon.com/labs/xml/ Broken Link
http://www.debian.org/security/2009/dsa-1859 Mailing List Patch
http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html Patch
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html Broken Link
http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html Third Party Advisory
http://www.securityfocus.com/archive/1/507985/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/36010 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-815-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html Third Party Advisory
http://www.vupen.com/english/advisories/2009/2420 Broken Link
http://www.vupen.com/english/advisories/2009/3184 Broken Link
http://www.vupen.com/english/advisories/2009/3217 Broken Link
http://www.vupen.com/english/advisories/2009/3316 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=515205 Issue Tracking Patch
https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7783 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 Broken Link
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html Mailing List
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*

Configuration 10 (hide)

OR cpe:2.3:a:sun:openoffice.org:*:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:*:*:*:*:*:*:*:*

History

02 Feb 2024, 16:04

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:a:sun:openoffice.org:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:vma:4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:3.5:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
First Time Redhat enterprise Linux
Apple safari
Sun openoffice.org
Canonical
Apple mac Os X
Suse linux Enterprise
Fedoraproject fedora
Vmware
Opensuse
Fedoraproject
Suse
Canonical ubuntu Linux
Google chrome
Vmware vma
Opensuse opensuse
Apple mac Os X Server
Debian
Google
Vmware vcenter Server
Redhat
Suse linux Enterprise Server
Vmware esx
Debian debian Linux
Sun
Vmware esxi
Apple
Apple iphone Os
CVSS v2 : 4.3
v3 : unknown
v2 : 4.3
v3 : 6.5
CWE CWE-399 CWE-416
References () http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html - () http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html - Release Notes
References () http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - () http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - Mailing List
References () http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html - () http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html - Mailing List
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - Mailing List
References () http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html - Mailing List
References () http://secunia.com/advisories/35036 - () http://secunia.com/advisories/35036 - Broken Link
References () http://secunia.com/advisories/36207 - () http://secunia.com/advisories/36207 - Broken Link
References () http://secunia.com/advisories/36338 - () http://secunia.com/advisories/36338 - Broken Link
References () http://secunia.com/advisories/36417 - () http://secunia.com/advisories/36417 - Broken Link
References () http://secunia.com/advisories/36631 - () http://secunia.com/advisories/36631 - Broken Link
References () http://secunia.com/advisories/37346 - () http://secunia.com/advisories/37346 - Broken Link
References () http://secunia.com/advisories/37471 - () http://secunia.com/advisories/37471 - Broken Link
References () http://support.apple.com/kb/HT3937 - () http://support.apple.com/kb/HT3937 - Third Party Advisory
References () http://support.apple.com/kb/HT3949 - () http://support.apple.com/kb/HT3949 - Third Party Advisory
References () http://support.apple.com/kb/HT4225 - () http://support.apple.com/kb/HT4225 - Third Party Advisory
References () http://www.cert.fi/en/reports/2009/vulnerability2009085.html - () http://www.cert.fi/en/reports/2009/vulnerability2009085.html - Broken Link
References () http://www.codenomicon.com/labs/xml/ - () http://www.codenomicon.com/labs/xml/ - Broken Link
References () http://www.debian.org/security/2009/dsa-1859 - Patch () http://www.debian.org/security/2009/dsa-1859 - Mailing List, Patch
References () http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html - () http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html - Patch
References () http://www.networkworld.com/columnists/2009/080509-xml-flaw.html - () http://www.networkworld.com/columnists/2009/080509-xml-flaw.html - Broken Link
References () http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html - () http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html - Third Party Advisory
References () http://www.securityfocus.com/archive/1/507985/100/0/threaded - () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/36010 - () http://www.securityfocus.com/bid/36010 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-815-1 - () http://www.ubuntu.com/usn/USN-815-1 - Third Party Advisory
References () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/2420 - () http://www.vupen.com/english/advisories/2009/2420 - Broken Link
References () http://www.vupen.com/english/advisories/2009/3184 - () http://www.vupen.com/english/advisories/2009/3184 - Broken Link
References () http://www.vupen.com/english/advisories/2009/3217 - () http://www.vupen.com/english/advisories/2009/3217 - Broken Link
References () http://www.vupen.com/english/advisories/2009/3316 - () http://www.vupen.com/english/advisories/2009/3316 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=515205 - () https://bugzilla.redhat.com/show_bug.cgi?id=515205 - Issue Tracking, Patch
References () https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59 - () https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59 - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7783 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7783 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9262 - Broken Link
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html - Mailing List
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html - Mailing List
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html - Mailing List

13 Feb 2023, 02:20

Type Values Removed Values Added
Summary CVE-2009-2416 libxml, libxml2, mingw32-libxml2: Pointer use-after-free flaws by parsing Notation and Enumeration attribute types Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2009-2416', 'name': 'https://access.redhat.com/security/cve/CVE-2009-2416', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2009:1206', 'name': 'https://access.redhat.com/errata/RHSA-2009:1206', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 15:15

Type Values Removed Values Added
References
  • {'url': 'http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg678527.html', 'name': '[debian-bugs-dist] 20090810 Bug#540865: libxml2: CVE-2009-2414, CVE-2009-2416 pointer-user-after-free and stack overflow because of function recursion', 'tags': ['Exploit'], 'refsource': 'MLIST'}
  • (MISC) https://access.redhat.com/security/cve/CVE-2009-2416 -
  • (MISC) https://access.redhat.com/errata/RHSA-2009:1206 -
  • (MISC) http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html -
Summary Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework. CVE-2009-2416 libxml, libxml2, mingw32-libxml2: Pointer use-after-free flaws by parsing Notation and Enumeration attribute types

Information

Published : 2009-08-11 18:30

Updated : 2024-02-02 16:04


NVD link : CVE-2009-2416

Mitre link : CVE-2009-2416

CVE.ORG link : CVE-2009-2416


JSON object : View

Products Affected

apple

  • mac_os_x_server
  • safari
  • iphone_os
  • mac_os_x

xmlsoft

  • libxml
  • libxml2

opensuse

  • opensuse

vmware

  • esx
  • vcenter_server
  • vma
  • esxi

redhat

  • enterprise_linux

sun

  • openoffice.org

suse

  • linux_enterprise
  • linux_enterprise_server

fedoraproject

  • fedora

google

  • chrome

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-416

Use After Free