Vulnonym.org

CVE-2008-1767 - Portliest Carpetmuncher

Description

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT \transformation match\ condition that triggers a large number of steps.

Reference

http://bugzilla.gnome.org/show_bug.cgi?id=527297 http://www.redhat.com/support/errata/RHSA-2008-0287.html http://www.securityfocus.com/bid/29312 http://www.securitytracker.com/id?1020071 http://secunia.com/advisories/30315 http://secunia.com/advisories/30323 http://www.debian.org/security/2008/dsa-1589 http://security.gentoo.org/glsa/glsa-200806-02.xml http://secunia.com/advisories/30393 http://secunia.com/advisories/30521 http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html http://www.mandriva.com/security/advisories?name=MDVSA-2008:151 http://secunia.com/advisories/31074 http://www.novell.com/linux/security/advisories/2008_13_sr.html http://www.ubuntu.com/usn/usn-633-1 http://secunia.com/advisories/30717 http://secunia.com/advisories/31363 http://www.securityfocus.com/bid/31681 http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html http://support.apple.com/kb/HT3216 http://secunia.com/advisories/32222 http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html http://support.apple.com/kb/HT3298 http://www.vupen.com/english/advisories/2008/1580/references http://www.vupen.com/english/advisories/2008/2094/references http://www.vupen.com/english/advisories/2008/2780 http://secunia.com/advisories/32706 https://exchange.xforce.ibmcloud.com/vulnerabilities/42560 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785