Search for vulnerabilities
Vulnerability details: VCID-fwp2-fmxj-aaaq
Vulnerability ID VCID-fwp2-fmxj-aaaq
Aliases CVE-2009-2414
Summary Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2009:1206
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.00232 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.01069 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
epss 0.0361 https://api.first.org/data/v1/epss?cve=CVE-2009-2414
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=515195
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2009-2414
generic_textual MODERATE http://www.cert.fi/en/reports/2009/vulnerability2009085.html
generic_textual MODERATE http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
cvssv3.1 4.2 http://www.securityfocus.com/archive/1/507985/100/0/threaded
generic_textual MODERATE http://www.securityfocus.com/archive/1/507985/100/0/threaded
cvssv3.1 4.2 http://www.vmware.com/security/advisories/VMSA-2009-0016.html
generic_textual MODERATE http://www.vmware.com/security/advisories/VMSA-2009-0016.html
cvssv3.1 4.2 http://www.vupen.com/english/advisories/2009/3316
generic_textual MODERATE http://www.vupen.com/english/advisories/2009/3316
Reference id Reference type URL
http://googlechromereleases.blogspot.com/2009/08/stable-update-security-fixes.html
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
http://lists.apple.com/archives/security-announce/2009/Nov/msg00001.html
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2414.json
https://api.first.org/data/v1/epss?cve=CVE-2009-2414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414
http://secunia.com/advisories/35036
http://secunia.com/advisories/36207
http://secunia.com/advisories/36338
http://secunia.com/advisories/36417
http://secunia.com/advisories/36631
http://secunia.com/advisories/37346
http://secunia.com/advisories/37471
https://git.gnome.org/browse/libxml2/commit/?id=489f9671e71cc44a97b23111b3126ac8a1e21a59
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10129
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8639
http://support.apple.com/kb/HT3937
http://support.apple.com/kb/HT3949
http://support.apple.com/kb/HT4225
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00537.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00547.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00642.html
http://www.cert.fi/en/reports/2009/vulnerability2009085.html
http://www.codenomicon.com/labs/xml/
http://www.debian.org/security/2009/dsa-1859
http://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg678527.html
http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg678527.html
http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
http://www.openoffice.org/security/cves/CVE-2009-2414-2416.html
http://www.securityfocus.com/archive/1/507985/100/0/threaded
http://www.securityfocus.com/bid/36010
http://www.ubuntu.com/usn/USN-815-1
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
http://www.vupen.com/english/advisories/2009/2420
http://www.vupen.com/english/advisories/2009/3184
http://www.vupen.com/english/advisories/2009/3217
http://www.vupen.com/english/advisories/2009/3316
515195 https://bugzilla.redhat.com/show_bug.cgi?id=515195
540865 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540865
cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*
CVE-2009-2414 https://nvd.nist.gov/vuln/detail/CVE-2009-2414
GLSA-201009-07 https://security.gentoo.org/glsa/201009-07
RHSA-2009:1206 https://access.redhat.com/errata/RHSA-2009:1206
USN-815-1 https://usn.ubuntu.com/815-1/
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2009-2414
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at http://www.securityfocus.com/archive/1/507985/100/0/threaded
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L Found at http://www.vupen.com/english/advisories/2009/3316
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.60581
EPSS Score 0.00225
Published At Jan. 16, 2025, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.