5.1
CVSSv2

CVE-2006-2200

Published: 28/06/2006 Updated: 02/08/2011
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in libmms, as used by (a) MiMMS 0.0.9 and (b) xine-lib 1.1.0 and previous versions, allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions.

Vulnerable Product Search on Vulmon Subscribe to Product

xine xine-lib 1.1.0

mimms mimms 0.0.9

Vendor Advisories

Debian Bug report logs - #374577 mimms: patch to fix many buffer overflows vulnerability Package: mimms; Maintainer for mimms is Mohammad Ebrahim Mohammadi Panah <ebrahim@mohammadiir>; Source for mimms is src:mimms (PTS, buildd, popcon) Reported by: Anon Sricharoenchai <anon_hui@yahoocom> Date: Tue, 20 Jun 2006 04: ...
Several buffer overflows were found in libmms By tricking a user into opening a specially crafted remote multimedia stream with an application using libmms, a remote attacker could overwrite an arbitrary memory portion with zeros, thereby crashing the program ...