First published: Fri May 23 2008(Updated: )
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Desktop-file-utils | =3 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =2.1 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =4 | |
Red Hat Enterprise Linux Desktop | =5 | |
Red Hat Enterprise Linux Workstation | =5 | |
Red Hat Linux Advanced Workstation | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1767 has a severity rating that could lead to a denial of service and potential arbitrary code execution.
The best way to fix CVE-2008-1767 is to upgrade libxslt to version 1.1.24 or later.
CVE-2008-1767 affects various versions of Red Hat Desktop and Red Hat Enterprise Linux from 2.1 to 5.0.
CVE-2008-1767 is a buffer overflow vulnerability in the libxslt library.
Yes, CVE-2008-1767 can potentially be exploited remotely through specially crafted XSLT transformation match conditions.