CVE-2008-1767

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
redhatenterprise_linux
2.1
redhatenterprise_linux
2.1
redhatenterprise_linux
2.1
redhatenterprise_linux
3.0
redhatenterprise_linux
3.0
redhatenterprise_linux
3.0
redhatenterprise_linux
4.0
redhatenterprise_linux
4.0
redhatenterprise_linux
4.0
redhatenterprise_linux
5.0
redhatlinux_advanced_workstation
2.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxslt
bullseye (security)
1.1.34-4+deb11u1
fixed
bullseye
1.1.34-4+deb11u1
fixed
bookworm
1.1.35-1
fixed
sid
1.1.35-1.1
fixed
trixie
1.1.35-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxslt
hardy
Fixed 1.1.22-1ubuntu1.2
released
gutsy
Fixed 1.1.21-2ubuntu2.2
released
feisty
Fixed 1.1.20-0ubuntu2.2
released
dapper
Fixed 1.1.15-1ubuntu1.2
released
References