diff options
author | Robert Buchholz <rbu@gentoo.org> | 2007-09-30 12:31:35 +0000 |
---|---|---|
committer | Robert Buchholz <rbu@gentoo.org> | 2007-09-30 12:31:35 +0000 |
commit | f5bc6c3b2de33420a151789df5baf09bdb968b59 (patch) | |
tree | 22285d05a9612e5c3a51206365e0c51dd4fdf799 /lib | |
download | security-f5bc6c3b2de33420a151789df5baf09bdb968b59.tar.gz security-f5bc6c3b2de33420a151789df5baf09bdb968b59.tar.bz2 security-f5bc6c3b2de33420a151789df5baf09bdb968b59.zip |
Initial checkin of Debian tools, as downloaded from svn://svn.debian.org/svn/secure-testing
svn path=/; revision=1
Diffstat (limited to 'lib')
-rw-r--r-- | lib/python/nvd.py | 135 |
1 files changed, 135 insertions, 0 deletions
diff --git a/lib/python/nvd.py b/lib/python/nvd.py new file mode 100644 index 0000000..87b6d14 --- /dev/null +++ b/lib/python/nvd.py @@ -0,0 +1,135 @@ +# nvd.py -- simplistic NVD parser +# Copyright (C) 2005 Florian Weimer <fw@deneb.enyo.de> +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 2 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA + +"""This module parses the XML files provided by the +National Vulnerability Database (NVD) <http://nvd.nist.gov/> +""" + +import xml.sax +import xml.sax.handler + +class _Parser(xml.sax.handler.ContentHandler): + """Parser helper class.""" + + def __init__(self): + self.result = [] + self.start_dispatcher = {} + for x in ('entry', 'local', 'range', 'remote', 'user_init', + 'avail', 'conf', 'int', 'sec_prot'): + self.start_dispatcher[x] = getattr(self, 'TAG_' + x) + self.path = [] + + def _noop(*args): + pass + + def startElement(self, name, attrs): + self.path.append((name, attrs)) + self.start_dispatcher.get(name, self._noop)(name, attrs) + + def TAG_entry(self, name, attrs): + self.name = attrs['name'].encode('utf-8') + self.published = attrs['published'].encode('utf-8') + self.severity = attrs.get('severity', u'').encode('utf-8') + self.discovered = attrs.get('discovered', u'').encode('utf-8') + + self.cve_desc = "" + self.range_local = self.range_remote = self.range_user_init = None + + self.loss_avail = self.loss_conf = self.loss_int \ + = self.loss_sec_prot_user = self.loss_sec_prot_admin \ + = self.loss_sec_prot_other = 0 + + def TAG_range(self, name, attrs): + self.range_local = self.range_remote = self.range_user_init = 0 + + def TAG_local(self, name, attrs): + self.range_local = 1 + def TAG_remote(self, name, attrs): + self.range_remote = 1 + def TAG_user_init(self, name, attrs): + self.range_user_init = 1 + def TAG_loss_types(self, name, attrs): + self.clear_loss() + def TAG_avail(self, name, attrs): + self.loss_avail = 1 + def TAG_conf(self, name, attrs): + self.loss_conf = 1 + def TAG_int(self, name, attrs): + self.loss_int = 1 + def TAG_sec_prot(self, name, attrs): + if attrs.has_key('user'): + self.loss_sec_prot_user = 1 + if attrs.has_key('admin'): + self.loss_sec_prot_admin = 1 + if attrs.has_key('other'): + self.loss_sec_prot_other = 1 + + def endElement(self, name): + if name == 'entry': + # FIXME: normalize CAN to CVE. Should go away soon. + name = self.name + if name[0:4] == 'CAN-': + name = 'CVE-' + name[4:] + self.result.append((name, + self.cve_desc, + self.discovered, + self.published, + self.severity, + self.range_local, + self.range_remote, + self.range_user_init, + self.loss_avail, + self.loss_conf, + self.loss_int, + self.loss_sec_prot_user, + self.loss_sec_prot_admin, + self.loss_sec_prot_other)) + del self.path[-1] + + def characters(self, content): + (name, attrs) = self.path[-1] + if name == 'descript' and attrs['source'] == 'cve': + self.cve_desc += content + +def parse(file): + """Parses the indicated file object. Returns a list of tuples, + containing the following elements: + + - CVE name + - discovery data (can be empty) + - publication date + - severity (can be empty) + - local range flag + - remote range flag + - availability loss type flag + - confidentiality loss type flag + - integrity loss type flag + - security protection (user) loss type flag + - security protection (admin) loss type flag + - security protection (other) loss type flag + """ + parser = xml.sax.make_parser() + parser.setFeature(xml.sax.handler.feature_namespaces, 0) + p = _Parser() + parser.setContentHandler(p) + parser.parse(file) + return p.result + +if __name__ == "__main__": + import sys + for name in sys.argv[1:]: + parse(file(name)) |