Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1767

Опубликовано: 10 апр. 2008
Источник: redhat
EPSS Средний

Описание

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=446809libxslt: fixed-sized steps array overflow via "template match" condition in XSL file

EPSS

Процентиль: 96%
0.2359
Средний

Связанные уязвимости

ubuntu
около 17 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

nvd
около 17 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

debian
около 17 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-d ...

github
около 3 лет назад

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

oracle-oval
около 17 лет назад

ELSA-2008-0287: libxslt security update (IMPORTANT)

EPSS

Процентиль: 96%
0.2359
Средний