Vulnerability Details : CVE-2008-2935
Multiple heap-based buffer overflows in the rc4 (1) encryption (aka exsltCryptoRc4EncryptFunction) and (2) decryption (aka exsltCryptoRc4DecryptFunction) functions in crypto.c in libexslt in libxslt 1.1.8 through 1.1.24 allow context-dependent attackers to execute arbitrary code via an XML file containing a long string as "an argument in the XSL input."
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-2935
Probability of exploitation activity in the next 30 days: 18.03%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-2935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-2935
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2935
-
http://security.gentoo.org/glsa/glsa-200808-06.xml
-
http://www.scary.beasts.org/security/CESA-2008-003.html
-
http://securityreason.com/securityalert/4078
-
http://www.securityfocus.com/bid/30467
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/44141
-
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306
-
http://www.securitytracker.com/id?1020596
-
http://www.debian.org/security/2008/dsa-1624
-
http://www.vupen.com/english/advisories/2008/2266/references
-
http://www.securityfocus.com/archive/1/497829/100/0/threaded
-
http://www.ocert.org/advisories/ocert-2008-009.html
Patch
-
http://www.securityfocus.com/archive/1/494976/100/0/threaded
-
http://www.redhat.com/support/errata/RHSA-2008-0649.html
- http://www.ubuntu.com/usn/usn-633-1
-
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:160
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827
-
http://www.ocert.org/patches/exslt_crypt.patch
Exploit;Patch
-
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html
-
http://www.securityfocus.com/archive/1/495018/100/0/threaded
Products affected by CVE-2008-2935
- cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*