Search for vulnerabilities
Vulnerability details: VCID-75a6-naxz-aaak
Vulnerability ID VCID-75a6-naxz-aaak
Aliases CVE-2008-4226
Summary Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2008:0988
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.01855 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.02141 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03607 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.03817 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
epss 0.09154 https://api.first.org/data/v1/epss?cve=CVE-2008-4226
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2008-4226
Reference id Reference type URL
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4226.json
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc10
https://admin.fedoraproject.org/updates/libxml2-2.7.2-2.fc9
https://api.first.org/data/v1/epss?cve=CVE-2008-4226
https://bugzilla.redhat.com/show_bug.cgi?id=470466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226
http://secunia.com/advisories/32762
http://secunia.com/advisories/32764
http://secunia.com/advisories/32766
http://secunia.com/advisories/32773
http://secunia.com/advisories/32802
http://secunia.com/advisories/32807
http://secunia.com/advisories/32811
http://secunia.com/advisories/32872
http://secunia.com/advisories/32974
http://secunia.com/advisories/33417
http://secunia.com/advisories/33746
http://secunia.com/advisories/33792
http://secunia.com/advisories/34247
http://secunia.com/advisories/35379
http://secunia.com/advisories/36173
http://secunia.com/advisories/36235
http://security.gentoo.org/glsa/glsa-200812-06.xml
http://securitytracker.com/id?1021238
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6219
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6360
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9888
http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
http://support.apple.com/kb/HT3613
http://support.apple.com/kb/HT3639
http://support.avaya.com/elmodocs2/security/ASA-2009-002.htm
http://support.avaya.com/elmodocs2/security/ASA-2009-067.htm
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
http://wiki.rpath.com/Advisories:rPSA-2008-0325
http://www.debian.org/security/2008/dsa-1666
http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
http://www.osvdb.org/49993
http://www.redhat.com/support/errata/RHSA-2008-0988.html
http://www.securityfocus.com/bid/32326
http://www.ubuntu.com/usn/usn-673-1
http://www.vmware.com/security/advisories/VMSA-2009-0001.html
http://www.vupen.com/english/advisories/2008/3176
http://www.vupen.com/english/advisories/2009/0034
http://www.vupen.com/english/advisories/2009/0301
http://www.vupen.com/english/advisories/2009/0323
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
cpe:2.3:a:xmlsoft:libxml:2.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml:2.7.2:*:*:*:*:*:*:*
CVE-2008-4226 https://nvd.nist.gov/vuln/detail/CVE-2008-4226
GLSA-200812-06 https://security.gentoo.org/glsa/200812-06
RHSA-2008:0988 https://access.redhat.com/errata/RHSA-2008:0988
USN-673-1 https://usn.ubuntu.com/673-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-4226
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.88626
EPSS Score 0.01809
Published At Dec. 3, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.