Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-4226

Опубликовано: 17 нояб. 2008
Источник: redhat
EPSS Низкий

Описание

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

Дополнительная информация

Статус:

Important
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=470466libxml2: integer overflow leading to memory corruption in xmlSAX2Characters

EPSS

Процентиль: 88%
0.03817
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

nvd
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

debian
больше 16 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 al ...

github
около 3 лет назад

Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.

oracle-oval
больше 16 лет назад

ELSA-2008-0988: libxml2 security update (IMPORTANT)

EPSS

Процентиль: 88%
0.03817
Низкий