First published: Fri Aug 01 2008(Updated: )
Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libxslt1-dev | =1.1.8 | |
libxslt1-dev | =1.1.9 | |
libxslt1-dev | =1.1.10 | |
libxslt1-dev | =1.1.11 | |
libxslt1-dev | =1.1.12 | |
libxslt1-dev | =1.1.13 | |
libxslt1-dev | =1.1.14 | |
libxslt1-dev | =1.1.15 | |
libxslt1-dev | =1.1.16 | |
libxslt1-dev | =1.1.17 | |
libxslt1-dev | =1.1.18 | |
libxslt1-dev | =1.1.19 | |
libxslt1-dev | =1.1.20 | |
libxslt1-dev | =1.1.21 | |
libxslt1-dev | =1.1.22 | |
libxslt1-dev | =1.1.23 | |
libxslt1-dev | =1.1.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2935 has been classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2008-2935, upgrade to a patched version of libxslt that is not affected by this vulnerability.
Libxslt versions from 1.1.8 through 1.1.24 are vulnerable to CVE-2008-2935.
CVE-2008-2935 can be exploited by context-dependent attackers using specially crafted XML files.
Yes, a patch for CVE-2008-2935 is available and should be applied to affected libxslt installations.