Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-4226

Опубликовано: 25 нояб. 2008
Источник: debian
EPSS Низкий

Описание

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2fixed2.6.32.dfsg-5package
chromium-browserfixed5.0.375.29~r46008-1package

EPSS

Процентиль: 86%
0.02789
Низкий

Связанные уязвимости

ubuntu
почти 17 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

redhat
почти 17 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

nvd
почти 17 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

github
больше 3 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

oracle-oval
почти 17 лет назад

ELSA-2008-0988: libxml2 security update (IMPORTANT)

EPSS

Процентиль: 86%
0.02789
Низкий