Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1767

Опубликовано: 10 апр. 2008
Источник: redhat

Описание

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=446809libxslt: fixed-sized steps array overflow via "template match" condition in XSL file

Связанные уязвимости

ubuntu
больше 17 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

nvd
больше 17 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

debian
больше 17 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-d ...

github
больше 3 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

oracle-oval
больше 17 лет назад

ELSA-2008-0287: libxslt security update (IMPORTANT)