Vulnerability Details : CVE-2008-1767
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2008-1767
Probability of exploitation activity in the next 30 days: 1.47%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1767
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1767
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1767
-
http://bugzilla.gnome.org/show_bug.cgi?id=527297
Exploit
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
-
http://www.redhat.com/support/errata/RHSA-2008-0287.html
- http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://support.apple.com/kb/HT3298
-
http://www.securityfocus.com/bid/29312
Exploit
- http://www.ubuntu.com/usn/usn-633-1
-
http://security.gentoo.org/glsa/glsa-200806-02.xml
-
http://www.debian.org/security/2008/dsa-1589
- http://www.vupen.com/english/advisories/2008/2094/references
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785
-
http://www.securitytracker.com/id?1020071
-
http://www.vupen.com/english/advisories/2008/2780
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42560
-
http://www.vupen.com/english/advisories/2008/1580/references
-
http://support.apple.com/kb/HT3216
About Security Update 2008-007 - Apple Support
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:151
- http://www.novell.com/linux/security/advisories/2008_13_sr.html
- http://www.securityfocus.com/bid/31681
Products affected by CVE-2008-1767
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:es:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:ws:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:3.0:*:as:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*
- cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
- cpe:2.3:o:redhat:desktop:3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5:*:*:*:*:*:*:*