[Secure-testing-team] Bug#482664: CVE-2008-1767: buffver overflow in pattern.c

Steffen Joeris steffen.joeris at skolelinux.de
Sat May 24 10:16:05 UTC 2008


Package: libxslt1.1
Version: 1.1.23-1
Severity: grave
Tags: security, patch
Justification: user security hole

Hi

The following CVE(0) has been issued against libxslt.

CVE-2008-1767:

Buffer overflow in pattern.c in libxslt before 1.1.24 allows
context-dependent attackers to cause a denial of service (crash) and
possibly execute arbitrary code via an XSL style sheet file with a long
XSLT "transformation match" condition that triggers a large number of
steps.

Upstream patch is attached.

Please mention the CVE id in your changelog, when you fix this bug.

Cheers
Steffen

(0): http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1767
-------------- next part --------------
A non-text attachment was scrubbed...
Name: patch
Type: text/x-c
Size: 7039 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080524/e4b292e4/attachment.bin 


More information about the Secure-testing-team mailing list