Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61326
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDVSA-2008:160 (libxslt)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to libxslt
announced via advisory MDVSA-2008:160.

Chris Evans of the Google Security Team found a vulnerability in the
RC4 processing code in libxslt that did not properly handle corrupted
key information. A remote attacker able to make an application
linked against libxslt process malicious XML input could cause the
application to crash or possibly execute arbitrary code with the
privileges of the application in question (CVE-2008-2935).

The updated packages have been patched to correct this issue.

Affected: 2007.1, 2008.0, 2008.1, Corporate 4.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2008:160

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-2935
1020596
http://www.securitytracker.com/id?1020596
20080731 [oCERT-2008-009] libxslt heap overflow
http://www.securityfocus.com/archive/1/494976/100/0/threaded
20080801 libxslt heap overflow
http://www.securityfocus.com/archive/1/495018/100/0/threaded
20081027 rPSA-2008-0306-1 libxslt
http://www.securityfocus.com/archive/1/497829/100/0/threaded
30467
http://www.securityfocus.com/bid/30467
31230
http://secunia.com/advisories/31230
31310
http://secunia.com/advisories/31310
31331
http://secunia.com/advisories/31331
31363
http://secunia.com/advisories/31363
31395
http://secunia.com/advisories/31395
31399
http://secunia.com/advisories/31399
32453
http://secunia.com/advisories/32453
4078
http://securityreason.com/securityalert/4078
ADV-2008-2266
http://www.vupen.com/english/advisories/2008/2266/references
DSA-1624
http://www.debian.org/security/2008/dsa-1624
FEDORA-2008-7029
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00092.html
FEDORA-2008-7062
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00118.html
GLSA-200808-06
http://security.gentoo.org/glsa/glsa-200808-06.xml
MDVSA-2008:160
http://www.mandriva.com/security/advisories?name=MDVSA-2008:160
RHSA-2008:0649
http://www.redhat.com/support/errata/RHSA-2008-0649.html
USN-633-1
http://www.ubuntu.com/usn/usn-633-1
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0306
http://www.ocert.org/advisories/ocert-2008-009.html
http://www.ocert.org/patches/exslt_crypt.patch
http://www.scary.beasts.org/security/CESA-2008-003.html
libxslt-multiple-crypto-bo(44141)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44141
oval:org.mitre.oval:def:10827
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10827
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.