CVE-2008-1767
23.05.2008, 15:32
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.Enginsight
| Vendor | Product | Version |
|---|---|---|
| redhat | enterprise_linux | 2.1 |
| redhat | enterprise_linux | 2.1 |
| redhat | enterprise_linux | 2.1 |
| redhat | enterprise_linux | 3.0 |
| redhat | enterprise_linux | 3.0 |
| redhat | enterprise_linux | 3.0 |
| redhat | enterprise_linux | 4.0 |
| redhat | enterprise_linux | 4.0 |
| redhat | enterprise_linux | 4.0 |
| redhat | enterprise_linux | 5.0 |
| redhat | linux_advanced_workstation | 2.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References