7.5
CVSSv2

CVE-2005-2967

Published: 14/10/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Format string vulnerability in input_cdda.c in xine-lib 1-beta through 1-beta 3, 1-rc, 1.0 up to and including 1.0.2, and 1.1.1 allows remote servers to execute arbitrary code via format string specifiers in metadata in CDDB server responses when the victim plays a CD.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine-lib 1.0

xine xine-lib 1.0.1

xine xine-lib 0.9.13

xine xine-lib 1.0.2

xine xine-lib 1.1.0

Vendor Advisories

Ulf Härnhammar from the Debian Security Audit Project discovered a format string vulnerability in the CDDB processing component of xine-lib, the xine video/media player library, that could lead to the execution of arbitrary code caused by a malicious CDDB entry For the old stable distribution (woody) this problem has been fixed in version 098-2 ...

Exploits

#!/usr/bin/perl -- # When playing an Audio CD, using xine-lib based media application, # the library contacts a CDDB server to retrieve metadata like the # title and artist's name During processing of this data, a response # from the server, which is located in memory on the stack, is passed # to the fprintf() function as a format string # An ...