CVE-2008-1767

Publication date 23 May 2008

Last updated 24 July 2024


Ubuntu priority

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.

Status

Package Ubuntu Release Status
libxslt 8.04 LTS hardy
Fixed 1.1.22-1ubuntu1.2
7.10 gutsy
Fixed 1.1.21-2ubuntu2.2
7.04 feisty
Fixed 1.1.20-0ubuntu2.2
6.06 LTS dapper
Fixed 1.1.15-1ubuntu1.2

References

Related Ubuntu Security Notices (USN)

    • USN-633-1
    • libxslt vulnerabilities
    • 1 August 2008

Other references