aboutsummaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorRobert Buchholz <rbu@gentoo.org>2007-09-30 12:31:35 +0000
committerRobert Buchholz <rbu@gentoo.org>2007-09-30 12:31:35 +0000
commitf5bc6c3b2de33420a151789df5baf09bdb968b59 (patch)
tree22285d05a9612e5c3a51206365e0c51dd4fdf799 /lib
downloadsecurity-f5bc6c3b2de33420a151789df5baf09bdb968b59.tar.gz
security-f5bc6c3b2de33420a151789df5baf09bdb968b59.tar.bz2
security-f5bc6c3b2de33420a151789df5baf09bdb968b59.zip
Initial checkin of Debian tools, as downloaded from svn://svn.debian.org/svn/secure-testing
svn path=/; revision=1
Diffstat (limited to 'lib')
-rw-r--r--lib/python/nvd.py135
1 files changed, 135 insertions, 0 deletions
diff --git a/lib/python/nvd.py b/lib/python/nvd.py
new file mode 100644
index 0000000..87b6d14
--- /dev/null
+++ b/lib/python/nvd.py
@@ -0,0 +1,135 @@
+# nvd.py -- simplistic NVD parser
+# Copyright (C) 2005 Florian Weimer <fw@deneb.enyo.de>
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; either version 2 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+
+"""This module parses the XML files provided by the
+National Vulnerability Database (NVD) <http://nvd.nist.gov/>
+"""
+
+import xml.sax
+import xml.sax.handler
+
+class _Parser(xml.sax.handler.ContentHandler):
+ """Parser helper class."""
+
+ def __init__(self):
+ self.result = []
+ self.start_dispatcher = {}
+ for x in ('entry', 'local', 'range', 'remote', 'user_init',
+ 'avail', 'conf', 'int', 'sec_prot'):
+ self.start_dispatcher[x] = getattr(self, 'TAG_' + x)
+ self.path = []
+
+ def _noop(*args):
+ pass
+
+ def startElement(self, name, attrs):
+ self.path.append((name, attrs))
+ self.start_dispatcher.get(name, self._noop)(name, attrs)
+
+ def TAG_entry(self, name, attrs):
+ self.name = attrs['name'].encode('utf-8')
+ self.published = attrs['published'].encode('utf-8')
+ self.severity = attrs.get('severity', u'').encode('utf-8')
+ self.discovered = attrs.get('discovered', u'').encode('utf-8')
+
+ self.cve_desc = ""
+ self.range_local = self.range_remote = self.range_user_init = None
+
+ self.loss_avail = self.loss_conf = self.loss_int \
+ = self.loss_sec_prot_user = self.loss_sec_prot_admin \
+ = self.loss_sec_prot_other = 0
+
+ def TAG_range(self, name, attrs):
+ self.range_local = self.range_remote = self.range_user_init = 0
+
+ def TAG_local(self, name, attrs):
+ self.range_local = 1
+ def TAG_remote(self, name, attrs):
+ self.range_remote = 1
+ def TAG_user_init(self, name, attrs):
+ self.range_user_init = 1
+ def TAG_loss_types(self, name, attrs):
+ self.clear_loss()
+ def TAG_avail(self, name, attrs):
+ self.loss_avail = 1
+ def TAG_conf(self, name, attrs):
+ self.loss_conf = 1
+ def TAG_int(self, name, attrs):
+ self.loss_int = 1
+ def TAG_sec_prot(self, name, attrs):
+ if attrs.has_key('user'):
+ self.loss_sec_prot_user = 1
+ if attrs.has_key('admin'):
+ self.loss_sec_prot_admin = 1
+ if attrs.has_key('other'):
+ self.loss_sec_prot_other = 1
+
+ def endElement(self, name):
+ if name == 'entry':
+ # FIXME: normalize CAN to CVE. Should go away soon.
+ name = self.name
+ if name[0:4] == 'CAN-':
+ name = 'CVE-' + name[4:]
+ self.result.append((name,
+ self.cve_desc,
+ self.discovered,
+ self.published,
+ self.severity,
+ self.range_local,
+ self.range_remote,
+ self.range_user_init,
+ self.loss_avail,
+ self.loss_conf,
+ self.loss_int,
+ self.loss_sec_prot_user,
+ self.loss_sec_prot_admin,
+ self.loss_sec_prot_other))
+ del self.path[-1]
+
+ def characters(self, content):
+ (name, attrs) = self.path[-1]
+ if name == 'descript' and attrs['source'] == 'cve':
+ self.cve_desc += content
+
+def parse(file):
+ """Parses the indicated file object. Returns a list of tuples,
+ containing the following elements:
+
+ - CVE name
+ - discovery data (can be empty)
+ - publication date
+ - severity (can be empty)
+ - local range flag
+ - remote range flag
+ - availability loss type flag
+ - confidentiality loss type flag
+ - integrity loss type flag
+ - security protection (user) loss type flag
+ - security protection (admin) loss type flag
+ - security protection (other) loss type flag
+ """
+ parser = xml.sax.make_parser()
+ parser.setFeature(xml.sax.handler.feature_namespaces, 0)
+ p = _Parser()
+ parser.setContentHandler(p)
+ parser.parse(file)
+ return p.result
+
+if __name__ == "__main__":
+ import sys
+ for name in sys.argv[1:]:
+ parse(file(name))