fkie_cve-2008-2935
Vulnerability from fkie_nvd
Published
2008-08-01 14:41
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."
References
secalert@redhat.comhttp://secunia.com/advisories/31230
secalert@redhat.comhttp://secunia.com/advisories/31310
secalert@redhat.comhttp://secunia.com/advisories/31331
secalert@redhat.comhttp://secunia.com/advisories/31363
secalert@redhat.comhttp://secunia.com/advisories/31395
secalert@redhat.comhttp://secunia.com/advisories/31399
secalert@redhat.comhttp://secunia.com/advisories/32453
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200808-06.xml
secalert@redhat.comhttp://securityreason.com/securityalert/4078
secalert@redhat.comhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306
secalert@redhat.comhttp://www.debian.org/security/2008/dsa-1624
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:160
secalert@redhat.comhttp://www.ocert.org/advisories/ocert-2008-009.htmlPatch
secalert@redhat.comhttp://www.ocert.org/patches/exslt_crypt.patchExploit, Patch
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2008-0649.html
secalert@redhat.comhttp://www.scary.beasts.org/security/CESA-2008-003.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/494976/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/495018/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/497829/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/30467
secalert@redhat.comhttp://www.securitytracker.com/id?1020596
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-633-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/2266/references
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/44141
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31230
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31310
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31331
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31363
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31395
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31399
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32453
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200808-06.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4078
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1624
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:160
af854a3a-2127-422b-91ae-364da2661108http://www.ocert.org/advisories/ocert-2008-009.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.ocert.org/patches/exslt_crypt.patchExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0649.html
af854a3a-2127-422b-91ae-364da2661108http://www.scary.beasts.org/security/CESA-2008-003.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/494976/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/495018/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497829/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30467
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020596
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-633-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2266/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44141
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html
Impacted products
Vendor Product Version
xmlsoft libxslt 1.1.8
xmlsoft libxslt 1.1.9
xmlsoft libxslt 1.1.10
xmlsoft libxslt 1.1.11
xmlsoft libxslt 1.1.12
xmlsoft libxslt 1.1.13
xmlsoft libxslt 1.1.14
xmlsoft libxslt 1.1.15
xmlsoft libxslt 1.1.16
xmlsoft libxslt 1.1.17
xmlsoft libxslt 1.1.18
xmlsoft libxslt 1.1.19
xmlsoft libxslt 1.1.20
xmlsoft libxslt 1.1.21
xmlsoft libxslt 1.1.22
xmlsoft libxslt 1.1.23
xmlsoft libxslt 1.1.24



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBFCEA36-7573-491B-8438-4E3FDF8E97ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF38997D-634C-423C-BD82-44E74A99D8DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B4CF5A-150E-4814-BA15-EF9FB30AD0CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4401FF-84D8-4AD5-BAED-978E31E5DADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC004874-3C5D-4932-AD5B-BE7156D7D13E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "269892E0-1ABA-4D0F-8266-A4DA8A575967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4597D362-AD62-4D58-BC7F-CCED44488466",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D885D06-D6E5-432C-9923-AE2CE73F7654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5003EF-82E2-49F9-9F74-CB92FE98E2E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D6095-2A7B-4328-ADA0-283E8F79AFDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C70E5E-A987-4BF3-9300-E4A3F2B0B853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5EFA6E9-593B-484A-A8FB-A22BAEE208B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C55B5B1-76F1-480B-B7F9-EF4AFE79E3F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "58E904DA-889E-44B9-9AF6-EC753FB316BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3BC6F57-1DDD-4EA6-83F9-2672B11DF7B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A51C1E-21C9-4FA4-8340-345B5E1F1B70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D7C38F-EF88-4531-803D-BA911978A176",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as \"an argument in the XSL input.\""
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en mont\u00edculo en las funciones rc4 de (1) cifrado (aka exsltCryptoRc4EncryptFunction) y (2) descifrado (aka exsltCryptoRc4DecryptFunction) en crypto.c en libexslt en libxslt 1.1.8 hasta 1.1.24 permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero XML que contiene una larga cadena de caracteres como \"un argumento en la entrada XSL.\""
    }
  ],
  "id": "CVE-2008-2935",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-01T14:41:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31230"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31310"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31331"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31363"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31395"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/31399"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/32453"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/4078"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2008/dsa-1624"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ocert.org/advisories/ocert-2008-009.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ocert.org/patches/exslt_crypt.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/30467"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1020596"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-633-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/2266/references"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31331"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200808-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4078"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1624"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:160"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ocert.org/advisories/ocert-2008-009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.ocert.org/patches/exslt_crypt.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0649.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.scary.beasts.org/security/CESA-2008-003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/494976/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/495018/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497829/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-633-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2266/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…