CVE-2008-2935

Xmlsoft Libxslt - Memory Corruption

Title source: rule
STIX 2.1

Description

Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."

Exploits (1)

exploitdb WRITEUP VERIFIED
by Chris Evans · textremotelinux
https://www.exploit-db.com/exploits/32133

References (27)

Core 27
Core References
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0649.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/44141
Third Party Advisory x_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32453
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31399
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31363
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/494976/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/30467
Exploit, Patch x_refsource_misc
http://www.ocert.org/patches/exslt_crypt.patch
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/4078
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200808-06.xml
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31310
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:160
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-633-1
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31331
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/497829/100/0/threaded
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/495018/100/0/threaded
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31230
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2266/references
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1020596
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2008/dsa-1624
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31395

Scores

EPSS 0.2214
EPSS Percentile 95.8%

Details

CWE
CWE-119
Status published
Products (17)
xmlsoft/libxslt 1.1.8
xmlsoft/libxslt 1.1.9
xmlsoft/libxslt 1.1.10
xmlsoft/libxslt 1.1.11
xmlsoft/libxslt 1.1.12
xmlsoft/libxslt 1.1.13
xmlsoft/libxslt 1.1.14
xmlsoft/libxslt 1.1.15
xmlsoft/libxslt 1.1.16
xmlsoft/libxslt 1.1.17
... and 7 more
Published Aug 01, 2008
Tracked Since Feb 18, 2026